
308657-14.00 Rev 00
xv
Figures
Figure 1-1. SecurID Login Procedure and Interface Dialog .......................................1-8
Figure 1-2. SecurID PIN Assignment Procedure and Interface Dialog ......................1-9
Figure 4-1. Sample Dinfo Display ...............................................................................4-6
Figure 4-2. Sample NVFS Directory Listing ...............................................................4-8
Figure 7-1. RUIBOOT Date and Time Entry .............................................................7-15
Figure 7-2. RUIBOOT Date and Time Example .......................................................7-17
Figure 7-3. Sample Response to readexe Command ..............................................7-30
Figure A-1. Sample Top-Level Hierarchy of Nortel Networks Router MIB Objects .... A-6
Figure B-1. Modem Connection ................................................................................. B-9
Figure B-2. Wfterm Icon .......................................................................................... B-18
Figure B-3. The Wfterm Base Program Window ..................................................... B-18
Figure B-4. Accessing the Modem Settings Window ............................................... B-20
Figure B-5. Verifying or Modifying Modem Interface Settings .................................. B-20
Figure B-6. Verifying Successful Modem Initialization ............................................. B-21
Figure B-7. Accessing Wfterm Telephone Call Functions ........................................ B-22
Figure B-8. Wfterm Dial Command Window ............................................................ B-23
Figure B-9. Wfterm File Transfer Operation Selection Window ............................... B-25
Figure B-10. Wfterm File to Transfer Window ............................................................ B-27
Figure B-11. Wfterm Connection Closed Window ..................................................... B-30
Figure B-12. Exiting/Quitting the Wfterm Program .................................................... B-31
Figure C-1. Syslog and Syslogd Operations ..............................................................C-3
Figure C-2. Router Event Message Filtering for One Host ........................................C-5
Figure C-3. Syslog Message Encapsulation ..............................................................C-8
Figure C-4. Syslog Message Composition .................................................................C-9
Comentarios a estos manuales