User guide

Contents
x
phn-2513_004v000 (Oct 2012)
Configuring quality of service .......................................................................................... 6-111
Task 15: Connecting link to the network ............................................................................... 6-114
Connecting to the network ............................................................................................... 6-114
Setting the real-time clock ............................................................................................... 6-115
Saving the system configuration ...................................................................................... 6-119
Configuring for FIPS 140-2 applications ................................................................................ 6-121
Prerequisites for FIPS 140-2 configuration ..................................................................... 6-121
Configuration procedures for FIPS 140-2 ........................................................................ 6-122
Checking that the unit is in FIPS 140-2 secure mode ..................................................... 6-122
HTTPS key size warning ................................................................................................... 6-123
Chapter 7: Operation ................................................................................................. 7-1
Web-based management ............................................................................................................. 7-2
Accessing the web interface ................................................................................................. 7-2
Using the menu options ........................................................................................................ 7-4
Viewing the system summary ............................................................................................... 7-6
Viewing the system status .................................................................................................... 7-7
Identifying a unit from the web browser title .................................................................... 7-12
Logging out ......................................................................................................................... 7-14
Managing alarms and events .................................................................................................... 7-15
Managing alarms ................................................................................................................ 7-15
Managing email alerts ........................................................................................................ 7-24
Managing SNMP traps ....................................................................................................... 7-24
Managing event notification messages .............................................................................. 7-31
Disabling and enabling the wireless interface ......................................................................... 7-32
Disabling wireless transmission ......................................................................................... 7-32
Enabling wireless transmission .......................................................................................... 7-32
Managing 1+1 Hot Standby links............................................................................................. 7-33
Viewing the status of a 1+1 Hot Standby link ................................................................... 7-33
Using the Protected Link page ........................................................................................... 7-36
Forcing protection switches ............................................................................................... 7-37
Enabling and disabling fault protection ............................................................................. 7-43
Replacing a CMU in a 1+1 Hot Standby link ..................................................................... 7-48
Managing security .................................................................................................................... 7-51
Exiting FIPS 140-2 mode .................................................................................................... 7-51
Zeroizing critical security parameters ............................................................................... 7-51
Displaying login information .............................................................................................. 7-52
Disabling AES encryption ................................................................................................... 7-52