5
Model 2285 Getting Started Guide
Contents
Primary and Secondary DNS ....................................................................................................................31
Using DHCP ..................................................................................................................................................31
SNMP configurations............................................................................................................................................33
MIB-II System objects Configuration .............................................................................................................33
Access Control Configuration .........................................................................................................................34
Trap Receiver Configuration ...........................................................................................................................34
Management using SNMP ..............................................................................................................................35
Dynamic DNS Configuration ...............................................................................................................................35
SMTP Configuration ............................................................................................................................................37
IP Filtering ............................................................................................................................................................38
Interface ..........................................................................................................................................................38
Option and IP address/mask ...........................................................................................................................39
Service ............................................................................................................................................................39
Chain rule .......................................................................................................................................................39
SYSLOG server configuration................................................................................................................................40
Locating server.......................................................................................................................................................40
Overview .........................................................................................................................................................40
Locating server configuration ..........................................................................................................................41
Locating server communication protocol ........................................................................................................41
NFS server configuration .......................................................................................................................................42
TCP service configuration .....................................................................................................................................42
4
Serial port configuration ............................................................................................................................... 44
Overview ...............................................................................................................................................................45
Serial Port Configuration.......................................................................................................................................47
Port Enable/Disable ........................................................................................................................................48
Port Title ........................................................................................................................................................48
Host Mode Configuration ..............................................................................................................................48
TCP mode ................................................................................................................................................49
UDP mode ................................................................................................................................................53
Modem emulation mode ...........................................................................................................................54
Remote host configuration ..............................................................................................................................58
Cryptography configuration ............................................................................................................................60
Secure Sockets Layer(SSL) cryptography method ......................................................................................60
RC4 cryptography method ........................................................................................................................63
Serial port parameters ......................................................................................................................................63
Modem configuration .....................................................................................................................................67
Port Logging ...................................................................................................................................................68
Port event handling configurations .................................................................................................................69
Event keywords .........................................................................................................................................70
5
System administration................................................................................................................................... 71
Introduction ..........................................................................................................................................................72
System Logging .....................................................................................................................................................72
Change Password...................................................................................................................................................73