Multi-Tech Systems RF310E Universal Remote User Manual


 
RASFinder RF300E/RF310E User Guide
RF300E/RF310E28
case sensitive pattern.
Filter
The drop-down list enables you to select a unique filter entry that was already defined in the ID field in
the Add/Edit Filters dialog box.
Call Back
Click this check box to enable the Call Back function. If the user is at a number where he wants to be
called, he can choose the specific number for call back. For this to work, the Call Back option must
be enabled (activated) and the Call Back Security Enabled option must NOT be enabled (activated).
The remote user would then use a standard PPP client or ASCII terminal to dial-in.
To enable Call Back
Security, you must enable (check) the Call Back option and fill in the following
three boxes/fields.
Call Back Security Enabled
This parameter is of use in dial-in applications where the user is always called back at a specific
number. Enabling this parameter (Alt-S) lets the administrator assign the call back parameters. Leave
this function disabled if the user is permitted to choose the call back number and the call back delay.
Call Back Number
The Call Back Number is editable only if Call Back Security is enabled (checked). This is the number
where the user will be called back. In this case, the user cannot choose the number where he wants
to be called back.
Note: You can enter the Call Back Number with or without dashes, the modem will ignore them if they
are present.
Call Back Delay
Call Back Delay is editable only if Call Back Security is enabled. This specifies the duration (in
seconds) after which the user will be called back at the administrator-assigned number.
Dial In Ports
The systems administrator can enable (highlight) any WAN Ports 1 through 6 to be made available for
dialing in to the RASFinder.
Dial Out Ports
The systems administrator can enable (highlight) WAN Ports 1 through 6 to be made available for
dialing out from the RASFinder.
Click the Rights button to assign user permissions for the remote user.
9 The User Permissions dialog box is displayed.
10 Build your user permissions database by filling in the following fields for each remote user.
Auto Protocols
This group enables the systems administrator to assign either unrestricted LAN/Intranet access or
limited protocol access. The three available options are: