Page 61 / 76 Scroll up to view Page 56 - 60
60
8.2
System Log
This function allows a system log to be kept and viewed upon request.
Follow the steps below to configure, enable, and view the system log.
STEP 1:
Click
Configure System Log
, as shown below (circled in
Red
).
STEP 2:
Select desired options and click
Apply/Save
.
Consult the table below for detailed descriptions of each system log option.
Option
Description
Log
Indicates whether the system is currently recording events.
The user
can enable or disable event logging.
By default, it is disabled.
To
enable it, select the
Enable
radio button and then click
Apply/Save
.
Page 62 / 76
61
Option
Description
Log
Level
Allows you to configure the event level and filter out unwanted events
below this level.
The events ranging from the highest critical level
“Emergency” down to this configured level will be recorded to the log
buffer on the WAP-5813n SDRAM.
When the log buffer is full, the newer
event will wrap up to the top of the log buffer and overwrite the old event.
By default, the log level is “Debugging”, which is the lowest critical level.
The log levels are defined as follows:
Emergency = system is unusable
Alert = action must be taken immediately
Critical = critical conditions
Error = Error conditions
Warning = normal but significant condition
Notice= normal but insignificant condition
Informational= provides information for reference
Debugging = debug-level messages
Emergency is the most serious event level, whereas Debugging is the
least important.
For instance, if the log level is set to Debugging, all the
events from the lowest Debugging level to the most critical level
Emergency level will be recorded.
If the log level is set to Error, only
Error and the level above will be logged.
Display
Level
Allows the user to select the logged events and displays on the
View
System Log
window for events of this level and above to the highest
Emergency level.
Mode
Allows you to specify whether events should be stored in the local
memory, or be sent to a remote system log server, or both
simultaneously.
If remote mode is selected, view system log will not be
able to display events saved in the remote system log server.
When either Remote mode or Both mode is configured, the WEB UI will
prompt the user to enter the Server IP address and Server UDP port.
STEP 3:
Click
View System Log
.
The results are displayed as follows.
8.3
TR-069 Client
WAN Management Protocol (TR-069) allows an Auto-Configuration Server (ACS) to
perform auto-configuration, provision, collection, and diagnostics to this device.
Select desired values and click
Apply/Save
to configure TR-069 client options.
Page 63 / 76
62
Option
Description
Inform
Disable/Enable TR-069 client on the CPE.
Inform Interval
The duration in seconds of the interval for which the CPE MUST
attempt to connect with the ACS and call the Inform method.
ACS URL
URL for the CPE to connect to the ACS using the CPE WAN
Management Protocol. This parameter MUST be in the form of a
valid HTTP or HTTPS URL. An HTTPS URL indicates that the ACS
supports SSL. The “host” portion of this URL is used by the CPE
for validating the certificate from the ACS when using
certificate-based authentication.
ACS User Name
Username used to authenticate the CPE when making a
connection to the ACS using the CPE WAN Management
Protocol. This username is used only for HTTP-based
authentication of the CPE.
ACS Password
Password used to authenticate the CPE when making a
connection to the ACS using the CPE WAN Management
Protocol. This password is used only for HTTP-based
authentication of the CPE.
WAN Interface
used by TR-069
client
Choose Any_WAN, LAN, Loopback or a configured connection.
Display SOAP
messages on
serial console
Enable/Disable SOAP messages on serial console. This option is
used for advanced troubleshooting of the device.
Connection Request
Authorization
Tick the checkbox
;
to enable.
User Name
Username used to authenticate an ACS making a Connection
Request to the CPE.
Password
Password used to authenticate an ACS making a Connection
Request to the CPE.
URL
Universal Resource Locator.
Page 64 / 76
63
The
Get RPC Methods
button forces the CPE to establish an immediate connection
to the ACS.
This may be used to discover the set of methods supported by the ACS
or CPE. This list may include both standard TR-069 methods (those defined in this
specification or a subsequent version) and vendor-specific methods. The receiver of
the response MUST ignore any unrecognized methods.
8.4
Internet Time
This option automatically synchronizes the router time with Internet timeservers.
To enable time synchronization, tick the corresponding checkbox
;
, choose your
preferred time server(s), select the correct time zone offset, and click
Save/Apply
.
NOTE:
Internet Time must be activated to use
Parental Control
(page 31).
In
addition, this menu item is not displayed when in Bridge mode since the
router would not be able to connect to the NTP timeserver.
8.5
Access Control
8.5.1
Passwords
This screen is used to configure the user account access passwords for the device.
Access to the WAP-5813n is controlled through the following three user accounts:
1234
- this has unrestricted access to change and view the configuration.
support
- used for remote maintenance and diagnostics of the router
user
- this has limited access.
This account can view configuration settings and
statistics, as well as, update the router firmware.
Use the fields below to change password settings.
Click
Save/Apply
to continue.
Page 65 / 76
64
NOTE:
Passwords must be 16 characters or less.
8.6
Update Software
This option allows for firmware upgrades from a locally stored file.
STEP 1:
Obtain an updated software image file from your ISP.
STEP 2
:
Enter the path and filename of the firmware image file in the
Software
File Name
field or click the Browse button to locate the image file.
STEP 3
:
Click the
Update Software
button once to upload and install the file.
NOTE
:
The update process will take about 2 minutes to complete.
The device
will reboot and the browser window will refresh to the default screen upon
successful installation. It is recommended that you compare the
Software Version
at the top of the Device Information screen with the
firmware version installed, to confirm the installation was successful.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top