User manual
3
CHAPTER 8 MANAGEMENT ..........................................................................................................61
8.1 SETTINGS.......................................................................................................................................61
8.1.1 Backup Settings...............................................................................................................61
8.1.2 Update Settings...............................................................................................................61
8.1.3 Restore Default ...............................................................................................................62
8.2 SYSTEM LOG .................................................................................................................................63
8.3 SNMP AGENT ...............................................................................................................................65
8.4 TR-069 CLIENT .............................................................................................................................65
8.5 INTERNET TIME .............................................................................................................................66
8.6 ACCESS CONTROL .........................................................................................................................67
8.6.1 Services...........................................................................................................................67
8.6.2 IP Addresses ...................................................................................................................67
8.6.3 Passwords .......................................................................................................................68
8.7 UPDATE SOFTWARE .......................................................................................................................69
8.8 SAVE AND REBOOT ........................................................................................................................70
APPENDIX A – FIREWALL...............................................................................................................71
APPENDIX B – PIN ASSIGNMENTS ...............................................................................................75
APPENDIX C – SPECIFICATIONS..................................................................................................76
APPENDIX D – SSH CLIENT............................................................................................................78