User manual ALCATEL-LUCENT SPEEDTOUCH 608 WL 1

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ALCATEL-LUCENT SPEEDTOUCH 608 WL. We hope that this ALCATEL-LUCENT SPEEDTOUCH 608 WL user guide will be useful to you.

Lastmanuals help download the user guide ALCATEL-LUCENT SPEEDTOUCH 608 WL.


Mode d'emploi ALCATEL-LUCENT SPEEDTOUCH 608 WL
Download
Manual abstract: user guide ALCATEL-LUCENT SPEEDTOUCH 608 WL1

Detailed instructions for use are in the User's Guide.

[. . . ] SpeedTouchTM608 WL Wireless Business DSL Routers CLI Reference Guide Release R5. 3. 1 SpeedTouchTM 608 WL CLI Reference Guide R5. 3. 1 Copyright Copyright ©1999-2005 THOMSON. Passing on, and copying of this document, use and communication of its contents is not permitted without written authorization from THOMSON. The content of this document is furnished for informational use only, may be subject to change without notice, and should not be construed as a commitment by THOMSON. THOMSON assumes no responsibility or liability for any errors or inaccuracies that may appear in this document. [. . . ] Choose between: pretty: the chains are shown as intuitive output in clear text. cli: the chains are shown via the CLI commands configuration. OPTIONAL [format = <{pretty | cli}>] EXAMPLE: =>firewall chain list Chains ====== Name Description ----------------------------------------------------------------sink system forward system source system sink_fire system forward_fire system source_fire system forward_host_service system forward_level system sink_system_service system forward_level_BlockAll system forward_level_Standard system forward_level_Disabled system => RELATED COMMANDS: firewall chain add firewall chain delete Add a chain. Delete a chain. E-DOC-CTC-20050531-0061 v1. 0 315 Firewall Commands firewall debug clear Clear the firewall statistics. SYNTAX: firewall debug clear EXAMPLE: =>firewall debug stats Statistics ========== Used rule contexts Total rule contexts Total packets parsed Packets parsed in hook sink Packets parsed in hook forward Packets parsed in hook source Packets dropped in hook sink Packets dropped in hook forward Packets dropped in hook source TCP flag errors detected TCP seq/ack/win errors detected ICMP errors with partial info ICMP errors without cause ICMP replies without request Packet replay errors :0 =>firewall debug clear =>firewall debug stats Statistics ========== Used rule contexts Total rule contexts Total packets parsed Packets parsed in hook sink Packets parsed in hook forward Packets parsed in hook source Packets dropped in hook sink Packets dropped in hook forward Packets dropped in hook source TCP flag errors detected TCP seq/ack/win errors detected ICMP errors with partial info ICMP errors without cause ICMP replies without request Packet replay errors :0 => : : : : : : : : : : : : : : 0 256 2554 1461 12 1041 0 0 0 14 5 0 0 0 : : : : : : : : : : : : : : 0 256 26 16 0 10 0 0 0 0 0 0 0 0 RELATED COMMANDS: firewall debug stats Display the firewall statistics. 316 E-DOC-CTC-20050531-0061 v1. 0 Firewall Commands firewall debug stats Display the firewall statistics. SYNTAX: firewall debug stats EXAMPLE: =>firewall debug stats Statistics ========== Used rule contexts Total rule contexts Total packets parsed Packets parsed in hook sink Packets parsed in hook forward Packets parsed in hook source Packets dropped in hook sink Packets dropped in hook forward Packets dropped in hook source TCP flag errors detected TCP seq/ack/win errors detected ICMP errors with partial info ICMP errors without cause ICMP replies without request Packet replay errors :0 => : : : : : : : : : : : : : : 0 256 2554 1461 12 1041 0 0 0 14 5 0 0 0 RELATED COMMANDS: firewall debug clear Clear the firewall statistics. E-DOC-CTC-20050531-0061 v1. 0 317 Firewall Commands firewall debug traceconfig Configure the firewall trace options. SYNTAX: firewall debug traceconfig [tcpchecks = <{disabled | enabled}>] [udpchecks = <{disabled|enabled}>] [icmpchecks = <{disabled | enabled}>] [sink = <{none | all | accept | deny | drop | reset} or number>] [forward = <{none | all | accept | deny | drop reset} or number>] [source = <{none | all | accept | deny | drop | reset} or number>] where: tcpchecks udpchecks icmpchecks sink forward source Disable or enable tcpchecks traces. Specify the action traced by the firewall for sink traffic. Specify the action traced by the firewall for forward traffic. Specify the action traced by the firewall for source traffic. OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL EXAMPLE: =>firewall debug traceconfig Trace Config ============ tcpchecks icmpchecks sink forward source => : : : : : disabled disabled none none none 318 E-DOC-CTC-20050531-0061 v1. 0 Firewall Commands firewall level add Add a security level. SYNTAX: firewall level add name = <string> [index = <number>] [readonly = <{disabled | enabled}>] [udptrackmode = <{strict | loose}>] [service = <{disabled | enabled}>] [proxy = <{disabled|enabled}>] [text = <quoted string>] where: name index The name of the security level to be added. REQUIRED OPTIONAL Tip Note readonly udptrackmode Use the command :firewall level list to obtain a list of indexes. If not specified, the new security level will be added at the bottom of the list. OPTIONAL OPTIONAL Select whether the security level is readonly (enabled) or not (disabled). Select the UDP connection tracking mode. Choose between: strict: replies to a request from a client must be in a specific window to the client. loose: inbound packets are allowed on the port that was first used to start the communication with the server (for example to allow a client of an online game to obtin peer-to-peer information from other clients of that same online game). The default is strict. proxy service text Enable or disable proxy system services for this security level. Disable or enable host service definitions. Description of the security level. OPTIONAL OPTIONAL OPTIONAL Note The maximum length is 39 characters. RELATED COMMANDS: firewall level delete firewall level list Delete a security level. List all the security levels. E-DOC-CTC-20050531-0061 v1. 0 319 Firewall Commands firewall level delete Delete a security level. SYNTAX: firewall level delete where: name The name of the security level to be deleted. REQUIRED name = <string> RELATED COMMANDS: firewall level add firewall level list Add a security level. List all the security levels. 320 E-DOC-CTC-20050531-0061 v1. 0 Firewall Commands firewall level flush Flush the security level configuration. SYNTAX: firewall level flush E-DOC-CTC-20050531-0061 v1. 0 321 Firewall Commands firewall level list List all the security levels. SYNTAX: firewall level list where: format Select the output format in which the security levels must be shown. Choose between: pretty: the security levels are shown as intuitive output in clear text. cli: the security levels are shown via the CLI commands configuration. [. . . ] OPTIONAL [mode = <{disable | wep | wpa-psk}>] EXAMPLE: =>wireless secmode config No security enabled, open authentication, no data encryption =>wireless secmode config mode=wep =>wireless secmode config Security level WEP: encryption key : 26FF871306 =>wireless secmode config mode=wpa-psk =>wireless secmode config Security level WPA-PSK: preshared key : 26FF871306 encryption : TKIP rekeying : every 0 seconds => E-DOC-CTC-20050531-0061 v1. 0 767 Wireless Commands wireless secmode wep Configure the WEP settings. If the current security mode is WEP, then the security mode must first be changed, before the WEP settings can be (re)configured. SYNTAX: wireless secmode wep where: encryptionkey The secret key to be used for WEP encryption. Two key lengths (64 or 128 bits) and two formats (alphanumeric or hexadecimal) are permitted: for 64-bit encryption: the key must consist of 10 hexadecimal digits or 5 alphanumeric characters for 128-bit encryption: the key must consist of 26 hexadecimal digits or 13 alphanumeric characters. OPTIONAL [encryptionkey = <quoted string>] Note If no encryptionkey is filled in, then the default encryptionkey is used. EXAMPLE: =>wireless secmode wep Security level WEP: encryption key : FFA22E9CCA enabled : yes => 768 E-DOC-CTC-20050531-0061 v1. 0 Wireless Commands wireless secmode wpa-psk Configure the WPA-PSK settings. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ALCATEL-LUCENT SPEEDTOUCH 608 WL

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ALCATEL-LUCENT SPEEDTOUCH 608 WL will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag