TRB256 Configuration Examples: Difference between revisions
m (JuliusSkuolevicius moved page Draft:TRB256 Configuration Examples to TRB256 Configuration Examples without leaving a redirect: From draft to main) |
m (Protected "TRB256 Configuration Examples" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) |
(No difference)
|
Revision as of 15:27, 31 July 2024
This page contains various configuration guides for TRB256. Unlike the articles in the TRB256 Manual, which provide more general knowledge on all of the router's features and functions, these guides are more in-depth and are usually focused on specific configuration scenarios with extensive explanations. While most of the guides apply to both Windows and Linux Operating Systems, some are exclusive to one OS and others aren't OS specific in any way and apply to any system.
VPN
Router control and monitoring
- Blocking Internet Access for LAN Clients
- UCI command usage
- Crontabs
- SSH RSA key authentication (Linux)
- SSH RSA key authentication (Windows)
- Monitoring via Modbus
- Modbus custom register block
- Monitoring with ThingsBoard IoT Platform