Siemens se5880 User Manual
Page 5
SIEMENS se5880 Ethernet Security Router
User’s Guide
SIEMENS
ii
Table of Contents
Adding/Modifying A User Account................................................................................................. 21
Deleting A User Account ............................................................................................................... 22
User Lookup.................................................................................................................................. 23
Secure Mode Configuration .......................................................................................................... 24
Configure the Radius Server......................................................................................................... 25
Configure the TacPlus Server ....................................................................................................... 26
Management Classes ................................................................................................................... 27
Change Password...................................................................................................................................... 28
Access Control ........................................................................................................................................... 29
DMZ ........................................................................................................................................................... 31
Router Clock .............................................................................................................................................. 33
DHCP ......................................................................................................................................................... 34
QoS ............................................................................................................................................................ 35
Configure QoS Policy.................................................................................................................... 36
Reorder QoS Policies.................................................................................................................... 38
Routing Table Configuration....................................................................................................................... 39
Dial Backup ................................................................................................................................................ 40
Internal Modem ............................................................................................................................. 41
External Modem ............................................................................................................................ 42
Switch Mirror Configuration........................................................................................................... 44
Switch Age Time ........................................................................................................................... 45
Command Line Interface............................................................................................................................ 46
File Editor ................................................................................................................................................... 47
NAT ............................................................................................................................................................ 49
SNMP......................................................................................................................................................... 50
Configure SSH .............................................................................................................................. 53
Load Keys ..................................................................................................................................... 54
Key Generator............................................................................................................................... 55
Firewall Scripts........................................................................................................................................... 56
Stateful Firewall.......................................................................................................................................... 57