Operation Manual

Redistribute Routes: Redistribute routes of the specified protocol or kind into RIPng, with the metric type and metric set
if specified, filtering the routes using the given route-map if specified.
Type: The type is the source of the route. Select from: Main, Connected, Static, OSPF, BGP.
Metric: RIPng metric is a value for distance for the network. Usually the RIP service increments the metric when the
network information is received. The metric for redistributed routes is set to 1.
Route Map: Route maps provide a means to filter and/or apply actions to routes, allowing policies to be applied to
routes.
Threat Management
NOTE: Threat Management is only available for the AER family or Cradlepoint products, and requires a feature license.
Enable this feature through Enterprise Cloud Manager.
Cradlepoint Secure Threat Management leverages Trend Micro's security experience and expertise in this one-pass
Deep Packet Inspection (DPI) solution. Threat Management includes settings for both IPS (intrusion prevention
system) and IDS (intrusion detection system), as well as application identification logging. Use Threat Management to
identify and prevent a wide variety of network threats.
This Threat Management solution examines network traffic for both signature matches from Trend Micro's large
signature database of known threats and statistical anomalies to detect previously unknown threats. Trend Micro
regularly adds new signatures to its database: update your signature database version to ensure you're defending
yourself against the newest threats. You have the option to update manually or schedule regular updates.
Follow these steps to get started with Threat Management:
1. To purchase a license or to begin a free trial, log into Enterprise Cloud Manager (ECM) and go to the Applications
tab (this is only available to the primary account administrator). Once entitled, the router must be rebooted for
Threat Management to begin working.
2. For complete configuration options, go to Network Settings Threat Management in the configuration pages (in
ECM or locally). See configuration options below.
3. Set up emailed or logged alerts in the Alerts tab in ECM.
88