xi EKI-9228G Series User Manual
Supported MIBs......................................................64
Figure 4.56 System > Advanced Configuration > SNMP > Access
Control Group.........................................................65
Figure 4.57 System > Advanced Configuration > SNMP > Access
Control Group > Add ..............................................66
Figure 4.58 System > Advanced Configuration > SNMP > User
Security Model........................................................67
Figure 4.59 System > Advanced Configuration > SNMP > User
Security Model > Add .............................................68
Figure 4.60 System > Advanced Configuration > SNMP > Source
Interface Configuration...........................................69
Figure 4.61 System > Advanced Configuration > SNMP > Server
Configuration..........................................................70
Figure 4.62 System > Advanced Configuration > SNTP > Global
Configuration..........................................................70
Figure 4.63 System > Advanced Configuration > SNTP > Global
Status .....................................................................71
Figure 4.64 System > Advanced Configuration > SNTP > Server
Configuration..........................................................72
Figure 4.65 System > Advanced Configuration > SNTP > Server
Configuration > Add................................................73
Figure 4.66 System > Advanced Configuration > SNTP > Server
Status .....................................................................74
Figure 4.67 System > Advanced Configuration > SNTP > Source
Interface Configuration...........................................75
Figure 4.68 System > Advanced Configuration > Time Ranges >
Configuration..........................................................75
Figure 4.69 System > Advanced Configuration > Time Ranges >
Configuration > Add................................................76
Figure 4.70 System > Advanced Configuration > Time Ranges >
Entry Configuration.................................................77
Figure 4.71 System > Advanced Configuration > Time Ranges >
Entry Configuration > Add Absolute.......................77
Figure 4.72 System > Advanced Configuration > Time Ranges >
Entry Configuration > Add Periodic ........................78
Figure 4.73 System > Advanced Configuration > Time Zone >
Summary................................................................79
Figure 4.74 System > Advanced Configuration > Time Zone >
Time Zone ..............................................................81
Figure 4.75 System > Advanced Configuration > Time Zone >
Summer Time.........................................................81
Figure 4.76 System > Advanced Configuration > Event Manager >
Alarm Status...........................................................83
Figure 4.77 System > Advanced Configuration > Event Manager >
Trap Log.................................................................83
Figure 4.78 System > Advanced Configuration > Event Manager >
Policy List ...............................................................84
Figure 4.79 System > Advanced Configuration > Event Manager >
Policy List > Add.....................................................85
Figure 4.80 System > Advanced Configuration > Event Manager >
Policy Selection......................................................86
Figure 4.81 System > Advanced Configuration > Event Manager >
Severity Configuration............................................86
4.3.3 Basic Configuration.....................................................................87
Figure 4.82 System > Basic Configuration > Switch..................87
4.3.4 Configuration Storage.................................................................88
Figure 4.83 System > Configuration Storage > Save................88
Figure 4.84 System > Configuration Storage > Reset...............88
Figure 4.85 System > Configuration Storage > Erase Startup ..88
Figure 4.86 System > Configuration Storage > Copy................89