RuggedCom RuggedRouter RX1100 User Manual
Page 10

RuggedRouter®
Revision 1.14.3
10
RX1000/RX1100™
30.2.4. Access Control ................................................................................................ 264
31. Configuring The Telnet Server ............................................................................................. 266
31.1. Introduction .................................................................................................................. 266
31.2. Telnet Fundamentals ................................................................................................. 266
31.3. Telnet Server Configuration ....................................................................................... 266
32. Configuring IRIGB And IEEE1588 ......................................................................................... 268
32.1. Introduction .................................................................................................................. 268
32.1.1. IEEE1588 Fundamentals .................................................................................. 268
32.1.2. IRIGB Fundamentals ........................................................................................ 269
32.1.3. GPS Cable compensation ............................................................................... 270
32.2. IRIGB/IEEE1588 Configuration ................................................................................... 271
32.2.1. IRIGB/IEEE1588 Main Menu ............................................................................ 271
32.2.2. General Configuration ...................................................................................... 271
32.2.3. IRIGB Configuration ......................................................................................... 271
32.2.4. IEEE1588 Configuration ................................................................................... 272
32.2.5. IRIGB Status .................................................................................................... 273
32.2.6. IEEE1588 Status .............................................................................................. 273
32.2.7. IRIGB Log ........................................................................................................ 274
33. Configuring the Intrusion Detection System .......................................................................... 275
33.1. Introduction .................................................................................................................. 275
33.1.1. Snort Fundamentals ......................................................................................... 275
33.2. IDS Configuration ........................................................................................................ 276
33.2.1. Snort IDS Main Menu ...................................................................................... 276
33.2.2. Network Settings .............................................................................................. 278
33.2.3. PreProcessors .................................................................................................. 279
33.2.4. Alerts & Logging ............................................................................................... 279
33.2.5. Edit Config File ................................................................................................. 279
34. Maintaining The Router ......................................................................................................... 280
34.1. Introduction .................................................................................................................. 280
34.2. Alert System ................................................................................................................ 280
34.2.1. Alert Main Menu ............................................................................................... 281
34.2.2. Alert Configuration ............................................................................................ 282
34.3. Industrial Defender ...................................................................................................... 285
34.3.1. What information is sent to an SEM unit ......................................................... 285
34.3.2. Industrial Defender Configuration ..................................................................... 286
34.4. Access Manager Security ........................................................................................... 288
34.4.1. What Access Manager's Secure Access Portal Protects And How .................. 288
34.4.2. Access Manager And The Firewall .................................................................. 288
34.4.3. Access Manager's Secure Access Portal Status Menu .................................... 291
34.4.4. Upgrading the Access Manager's Secure Access Portal ................................. 291
34.5. Backup And Restore ................................................................................................... 291
34.5.1. General Configuration ...................................................................................... 292
34.5.2. Configuration Rollback ..................................................................................... 293
34.5.3. Archive History ................................................................................................. 295
34.5.4. Archive Backup ................................................................................................ 296
34.5.5. Archive Restore ................................................................................................ 296
34.5.6. Archive Difference Tool .................................................................................... 298
34.6. SNMP Configuration .................................................................................................. 299
34.6.1. SNMP Main Configuration Menu .................................................................... 300