Table of Contents
NXC Series User’s Guide
12
28.6.7 Add Domain Zone Forwarder .......................................................................................... 309
28.6.8 MX Record ........................................................................................................................ 310
28.6.9 Add MX Record ................................................................................................................. 310
28.6.10 Add Service Control ....................................................................................................... 310
28.7 WWW Overview ......................................................................................................................... 311
28.7.1 Service Access Limitations ............................................................................................... 311
28.7.2 System Timeout .................................................................................................................. 312
28.7.3 HTTPS ................................................................................................................................... 312
28.7.4 Configuring WWW Service Control ................................................................................. 313
28.7.5 Service Control Rules ........................................................................................................ 315
28.7.6 HTTPS Example ................................................................................................................... 316
28.8 SSH ............................................................................................................................................. 322
28.8.1 How SSH Works .................................................................................................................. 323
28.8.2 SSH Implementation on the NXC .................................................................................... 324
28.8.3 Requirements for Using SSH ..............................................................................................324
28.8.4 Configuring SSH ................................................................................................................. 324
28.8.5 Examples of Secure Telnet Using SSH .............................................................................. 325
28.9 Telnet ........................................................................................................................................... 326
28.10 FTP .............................................................................................................................................. 328
28.11 SNMP ......................................................................................................................................... 329
28.11.1 Supported MIBs ............................................................................................................... 330
28.11.2 SNMP Traps ....................................................................................................................... 330
28.11.3 Configuring SNMP ........................................................................................................... 331
28.11.4 Adding or Editing an SNMPv3 User Profile .................................................................... 333
28.12 Authentication Server ............................................................................................................. 333
28.12.1 Add/Edit Trusted RADIUS Client .................................................................................... 334
28.13 Language ................................................................................................................................. 335
28.14 IPv6 ............................................................................................................................................. 336
Chapter 29
Log and Report.................................................................................................................................337
29.1 Overview ..................................................................................................................................... 337
29.1.1 What You Can Do In this Chapter .................................................................................. 337
29.2 Email Daily Report ....................................................................................................................... 337
29.3 Log Settings ................................................................................................................................ 339
29.3.1 Log Settings Summary ...................................................................................................... 340
29.3.2 Editing System Log Settings ............................................................................................. 342
29.3.3 Editing USB Storage Log Settings .................................................................................... 345
29.3.4 Editing Remote Server Log Settings ............................................................................... 346
29.3.5 Log Category Settings ..................................................................................................... 348
Chapter 30
File Manager ....................................................................................................................................352