TRB255 Configuration Examples: Difference between revisions
No edit summary |
No edit summary |
||
Line 17: | Line 17: | ||
<li>[[SSH RSA key authentication (Windows)]]</li> | <li>[[SSH RSA key authentication (Windows)]]</li> | ||
<li>[[TRB255 Monitoring via Modbus|Monitoring via Modbus]]</li> | <li>[[TRB255 Monitoring via Modbus|Monitoring via Modbus]]</li> | ||
</ul> | |||
==Third-party IoT platforms== | |||
<ul> | |||
<li>[[Cumulocity Configuration|Cumulocity]]</li> | |||
</ul> | </ul> | ||
Revision as of 13:42, 21 July 2020
This page contains various configuration guides for TRB255. Unlike the articles in the TRB255 Manual, which provide more general knowledge on all of the router's features and functions, these guides are more in-depth and are usually focused on specific configuration scenarios with extensive explanations. While most of the guides apply to both Windows and Linux Operating Systems, some are exclusive to one OS and others aren't OS specific in any way and apply to any system.
VPN
Router control and monitoring
- Blocking Internet Access for LAN Clients
- Configuration Backup
- UCI command usage
- Crontabs
- SSH RSA key authentication (Linux)
- SSH RSA key authentication (Windows)
- Monitoring via Modbus