R s t u v w – H3C Technologies H3C MSR 50 User Manual
Page 877
492
Protocols and standards,
Protocols and standards for FoIP,
PSK authentication configuration example,
R
Recommended basic bridging configuration
procedure,
Recommended configuration procedure,
Recommended configuration procedure,
Recommended configuration procedure,
Recommended configuration procedure for automatic
request,
Recommended configuration procedure for manual
request,
Recommended configuration procedures,
Remote 802.1X authentication configuration
example,
Remote MAC authentication configuration example,
Restoring configuration,
Restoring factory defaults,
S
Saving the configuration,
Security parameter dependencies,
Selecting a country,
Service configuration,
Setting CAC admission policy,
Setting EDCA parameters for wireless clients,
Setting LAN interface parameters,
Setting radio EDCA parameters for APs,
Setting rate limiting,
Setting the background image for the WiNet topology
diagram,
Setting the super password,
Setting the SVP service,
Setting the system time,
Setting the time zone and daylight saving time,
Setting WAN interface parameters,
Setting WLAN interface parameters,
Signaling encryption,
Silent monitor and barge in services,
SIP fundamentals,
SIP local survival services,
SIP messages,
SNMPv1/v2c configuration example,
SNMPv3 configuration example,
Specifying the outbound proxy,
Static rate limiting configuration example,
STP protocol packets,
Subnet limit,
Subnet limit configuration example,
Successive jumping,
Support for SIP voice service of the VCX,
Switching to the management level,
Synchronizing user group configuration for wan
interfaces,
T
Terminology,
Three-party conference,
Timeout processing methods,
TLS-SRTP combinations,
TR-069 basic functions,
TR-069 network framework,
Trusted nodes,
Typical applications,
U
Upgrading software (for the MSR 20/30/50),
Upgrading software (for the MSR 900/MSR
20-1X),
Uploading media resource files,
User management,
V
Validating the basic services configuration,
Various codecs,
Various types of secondary calls,
Viewing blacklist entries,
Viewing history user information,
Viewing online user information,
VLAN transparency,
W
WiNet establishment configuration example,
WiNet-based RADIUS authentication configuration
example,
Wireless service configuration example,