EasyManua.ls Logo

ELTEX ESR-3100 - Page 3

Default Icon
650 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ESR series service routers.ESR-Series. User manual
3
3.4 Connection to Power Supply...........................................................................................84
3.5 SFP transceiver installation and removal.......................................................................85
3.5.1 Transceiver installation ............................................................................................... 85
3.5.2 Transceiver removal .................................................................................................... 85
4 Management interfaces ..................................................................................................... 86
4.1 Command line interface (CLI) .........................................................................................86
4.2 Types and naming procedure of router interfaces ........................................................87
4.3 Types and naming procedure of router tunnels.............................................................90
5 Initial router configuration.................................................................................................. 91
5.1 ESR router factory configuration....................................................................................91
5.1.1 Description of factory settings.................................................................................... 91
5.2 Router connection and configuration.............................................................................92
5.2.1 Connection to the router.............................................................................................. 93
5.2.2 Applying the configuration change............................................................................. 93
5.2.3 Basic router configuration........................................................................................... 94
6 Firmware update ................................................................................................................. 98
6.1 Updating firmware via system resources.......................................................................98
6.2 Updating firmware via bootloader ................................................................................100
6.3 Secondary bootloader update (U-Boot)........................................................................101
7 Safe configuration recommendations............................................................................. 104
7.1 General recommendations............................................................................................104
7.2 Event logging system configuration .............................................................................104
7.2.1 Recommendations..................................................................................................... 105
7.2.2 Warnings..................................................................................................................... 105
7.2.3 Configuration example .............................................................................................. 105
7.3 Password usage policy configuration ..........................................................................105
7.3.1 Recommendations..................................................................................................... 106
7.3.2 Configuration example .............................................................................................. 106
7.4 AAA policy configuration...............................................................................................106
7.4.1 Recommendations..................................................................................................... 106
7.4.2 Warnings..................................................................................................................... 107
7.4.3 Configuration example .............................................................................................. 107
7.5 Remote management configuration............................................................................108
7.5.1 Recommendations..................................................................................................... 108
7.5.2 Configuration example .............................................................................................. 108
7.6 Configuration of protection against network attacks mechanisms...........................109
7.6.1 Recommendations..................................................................................................... 109
7.6.2 Configuration example .............................................................................................. 110

Table of Contents

Related product manuals