ZyXEL Communications X2002 User Manual page 29

Ip-pbx
Hide thumbs Also See for X2002:
Table of Contents

Advertisement

Figure 259 Monitor > Status Observation > BRI Trunk ........................................................................ 287
Figure 260 Monitor > Status Observation > PRI Trunk ........................................................................ 288
Figure 261 Report > LOGS > System Log > View Log ........................................................................ 293
Figure 262 Report > LOGS > System Log > View Log: Show Filter ..................................................... 294
Figure 263 Report > LOGS > System Log > Log Setting ..................................................................... 295
Figure 264 Report > LOGS > System Log > Log Setting > Active Log Summary ................................ 296
Figure 265 Report > LOGS > System Log > Log Setting > Edit Internal Log ...................................... 297
Figure 266 Report > LOGS > System Log > Log Setting > Edit Remote Log ..................................... 299
Figure 267 Report > LOGS > CDR > Management ............................................................................. 302
Figure 268 Report > LOGS > CDR > Backup List ................................................................................ 304
Figure 269 Report > LOGS > CDR > CDR Query ................................................................................ 305
Figure 270 Report > LOGS > CDR > CDR Query > Report ................................................................. 307
Figure 271 Maintenance > Administrator Username/Password .......................................................... 310
Figure 272 Maintenance > Administrator List ....................................................................................... 310
Figure 273 Maintenance > Administrator List > Add .............................................................................311
Figure 274 Maintenance > Administrator List > Edit ............................................................................. 312
Figure 275 Maintenance > Administration > Diagnostic > Information Collect ..................................... 314
Figure 276 Maintenance > Administration > Diagnostic > Packet Capture .......................................... 315
Figure 277 Maintenance > Administration > Inactivity Timer ................................................................ 317
Figure 278 Secure and Insecure Remote Management From the WAN .............................................. 319
Figure 279 Remote Management: WWW ............................................................................................. 321
Figure 280 WWW: Add/Edit .................................................................................................................. 322
Figure 281 Remote Management: SSH .............................................................................................. 323
Figure 282 SSH: Add/Edit .................................................................................................................... 324
Figure 283 Remote Management: FTP ................................................................................................ 324
Figure 284 FTP: Add/Edit ..................................................................................................................... 325
Figure 285 Remote Management: ICMP .............................................................................................. 326
Figure 286 ICMP: Add/Edit ................................................................................................................... 327
Figure 287 Remote Management: V200 .............................................................................................. 328
Figure 288 V200: Add/Edit ................................................................................................................... 329
Figure 289 Security Alert Dialog Box (Internet Explorer) ...................................................................... 330
Figure 290 Example: Lock Denoting a Secure Connection .................................................................. 330
Figure 291 How SSH Works ................................................................................................................. 331
Figure 292 SSH Example 1: Store Host Key ........................................................................................ 332
Figure 293 SSH Example 2: Test ........................................................................................................ 332
Figure 294 SSH Example 2: Log in ...................................................................................................... 333
Figure 295 Secure FTP: Firmware Upload Example ............................................................................ 333
Figure 296 Maintenance > Backup & Restore ...................................................................................... 337
Figure 297 Maintenance > Firmware Upgrade ..................................................................................... 338
Figure 298 Maintenance > License Control > Registration ................................................................. 342
Figure 299 Maintenance > License Control > Service .......................................................................... 343
Figure 300 Maintenance > License Control > License Status .............................................................. 344
Figure 301 Web Portal Overview .......................................................................................................... 347
29
X2002 User's Guide

Advertisement

Table of Contents
loading

Table of Contents