3.5 SFP transceiver installation and removal.......................................................................... 71
3.5.1 Transceiver installation ............................................................................................... 71
3.5.2 Transceiver removal .................................................................................................... 72
4 Management interfaces ..................................................................................................... 73
4.1 Command line interface (CLI) ............................................................................................ 73
4.2 Types and naming procedure of router interfaces ........................................................... 73
4.3 Types and naming procedure of router tunnels................................................................ 77
5 Initial router configuration.................................................................................................. 78
5.1 ESR router factory settings ................................................................................................ 78
5.1.1 Description of factory settings.................................................................................... 78
5.2 Router connection and configuration................................................................................ 79
5.2.1 Connection to the router.............................................................................................. 79
5.2.2 Applying the configuration change............................................................................. 80
5.2.3 Basic router configuration........................................................................................... 81
6 Firmware update ................................................................................................................. 85
6.1 Updating firmware via system resources.......................................................................... 85
6.2 Updating firmware via bootloader ..................................................................................... 87
6.3 Secondary bootloader update (U-Boot)............................................................................. 88
7 Safe configuration recommendations............................................................................... 91
7.1 General recommendations................................................................................................. 91
7.2 Event logging system configuration .................................................................................. 91
7.2.1 Recommendations....................................................................................................... 92
7.2.2 Warnings....................................................................................................................... 92
7.2.3 Configuration example ................................................................................................ 92
7.3 Password usage policy configuration ............................................................................... 92
7.3.1 Recommendations....................................................................................................... 93
7.3.2 Configuration example ................................................................................................ 93
7.4 AAA policy configuration.................................................................................................... 93
7.4.1 Recommendations....................................................................................................... 94
7.4.2 Warnings....................................................................................................................... 94
7.4.3 Configuration example ................................................................................................ 94
7.5 Remote management configuration................................................................................. 95
7.5.1 Recommendations....................................................................................................... 95
7.5.2 Configuration example ................................................................................................ 95
7.6 Configuration of protection against network attacks mechanisms................................ 96
7.6.1 Recommendations....................................................................................................... 96
7.6.2 Configuration example ................................................................................................ 97