ISDN-Router Prestige 201
8.1.2
8.2 Log und Ablauf ................................................................................................................8-7
8.2.1
Fehlerlog anzeigen .............................................................................................................. 8-7
8.2.2
Syslog und Accounting........................................................................................................ 8-9
8.2.3
Anruf auslösendes Paket.................................................................................................... 8-10
8.3 Diagnose....................................................................................................................... 8-11
8.4 Bootmodulbefehle .........................................................................................................8-14
8.6 Anrufkontrolle................................................................................................................8-15
8.6.1
8.6.2
Schwarze Liste.................................................................................................................. 8-18
8.6.3
Budgetverwaltung ............................................................................................................. 8-19
8.6.4
Anrufverlauf ..................................................................................................................... 8-19
Kapitel 9 ....................................................................................................................................9-1
Einrichtung von Zeitplänen ......................................................................................................9-1
Kapitel 10 ................................................................................................................................10-1
10.1
Konfiguration absichern .............................................................................................10-1
10.1.1
10.1.2
Über FTP absichern ...................................................................................................... 10-2
10.1.3
Über TFTP absichern .................................................................................................... 10-3
10.2
10.2.1
10.2.2
Inhaltsverzeichnis
ix