EasyManua.ls Logo

ELTEX ESR Series - Page 3

ELTEX ESR Series
575 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ESR-Series. User manual
3
3.5 SFP transceiver installation and removal.......................................................................... 71
3.5.1 Transceiver installation ............................................................................................... 71
3.5.2 Transceiver removal .................................................................................................... 72
4 Management interfaces ..................................................................................................... 73
4.1 Command line interface (CLI) ............................................................................................ 73
4.2 Types and naming procedure of router interfaces ........................................................... 73
4.3 Types and naming procedure of router tunnels................................................................ 77
5 Initial router configuration.................................................................................................. 78
5.1 ESR router factory settings ................................................................................................ 78
5.1.1 Description of factory settings.................................................................................... 78
5.2 Router connection and configuration................................................................................ 79
5.2.1 Connection to the router.............................................................................................. 79
5.2.2 Applying the configuration change............................................................................. 80
5.2.3 Basic router configuration........................................................................................... 81
6 Firmware update ................................................................................................................. 85
6.1 Updating firmware via system resources.......................................................................... 85
6.2 Updating firmware via bootloader ..................................................................................... 87
6.3 Secondary bootloader update (U-Boot)............................................................................. 88
7 Safe configuration recommendations............................................................................... 91
7.1 General recommendations................................................................................................. 91
7.2 Event logging system configuration .................................................................................. 91
7.2.1 Recommendations....................................................................................................... 92
7.2.2 Warnings....................................................................................................................... 92
7.2.3 Configuration example ................................................................................................ 92
7.3 Password usage policy configuration ............................................................................... 92
7.3.1 Recommendations....................................................................................................... 93
7.3.2 Configuration example ................................................................................................ 93
7.4 AAA policy configuration.................................................................................................... 93
7.4.1 Recommendations....................................................................................................... 94
7.4.2 Warnings....................................................................................................................... 94
7.4.3 Configuration example ................................................................................................ 94
7.5 Remote management configuration................................................................................. 95
7.5.1 Recommendations....................................................................................................... 95
7.5.2 Configuration example ................................................................................................ 95
7.6 Configuration of protection against network attacks mechanisms................................ 96
7.6.1 Recommendations....................................................................................................... 96
7.6.2 Configuration example ................................................................................................ 97

Table of Contents

Related product manuals