ESR-Series. User manual
19
•
•
Authentication
Authentication is a user identity check procedure. Routers support the
following authentication methods:
local
– local user database stored on the device is used for
authentication;
group
– user database is located on the authentication
server. RADIUS and TACACS protocols are user for server
interactions.
SSH Server/
Telnet Server
SSH and Telnet server features allow you to establish connection to
the device and perform device management.
Automatic configuration restore
Device features automatic configuration restore system designed to
prevent remote access loss after re-configuration. If the configuration
change is not confirmed in the specified time, configuration will be
rolled back to the last known state.
2.2.7 Network security functions
Table 7 lists network security functions of the device.
Table 7 – Network security functions
Security zones
All router interfaces are distributed by security areas.
For each zone pair, you can set the rules that determine the possibility of data
transmission between zones, data traffic filtering rules.
Data filtering
For each zone pair, you can specify the rule set that manages the filtering
process for data transmitted through the router.
Device command interface provides appropriate means for detailed
configuration of the traffic classification rules and to apply the resulting
solution for traffic transmission.
Содержание ESR Series
Страница 218: ...ESR Series User manual 218 ...
Страница 234: ...ESR Series User manual 234 In addition to RIP protocol configuration open UDP port 520 in the firewall ...
Страница 306: ...ESR Series User manual 306 Parameter targeted LDP Hold timer 45 seconds Keepalive holdtime 180 seconds ...
Страница 452: ...ESR Series User manual 452 Step Description Command Keys 4 Enable Tracking object esr config tracking enable ...
Страница 514: ...ESR Series User manual 514 esr show ntp peers ...