ZyXEL Communications ES-3124PWR Switch User Manual


 
ES-3124PWR Ethernet Switch
Table of Contents xi
Chapter 14 Link Aggregation............................................................................................................................................................14-1
14.1 Introduction to Link Aggregation......................................................................................................14-1
14.1.1 Dynamic Link Aggregation.....................................................................................................14-1
14.1.2 Link Aggregation ID ..............................................................................................................14-1
14.2 Link Aggregation Protocol Status ....................................................................................................14-2
14.3 Link Aggregation Setup ..................................................................................................................14-3
Chapter 15 Port Authentication........................................................................................................................................................15-1
15.1 Introduction to Authentication..........................................................................................................15-1
15.1.1 RADIUS................................................................................................................................15-1
15.2 Configuring Port Authentication.......................................................................................................15-1
15.2.1 Configuring RADIUS Server Settings......................................................................................15-2
15.2.2 Configuring IEEE802.1x ........................................................................................................15-2
Chapter 16 Port Security....................................................................................................................................................................16-1
16.1 About Port Security........................................................................................................................16-1
16.2 Port Security Setup........................................................................................................................16-1
Chapter 17 Access Control ...............................................................................................................................................................17-1
17.1 About Access Control.....................................................................................................................17-1
17.2 Access Control Overview ...............................................................................................................17-1
17.3 About SNMP .................................................................................................................................17-2
17.3.1 Supported MIBs.....................................................................................................................17-3
17.3.2 SNMP Traps..........................................................................................................................17-3
17.3.3 Configuring SNMP.................................................................................................................17-3
17.3.4 Setting Up Login Accounts.....................................................................................................17-4
17.4 SSH Overview...............................................................................................................................17-6
17.5 How SSH works.............................................................................................................................17-6
17.6 SSH Implementation on the ES-3124PWR......................................................................................17-7
17.6.1 Requirements for Using SSH ..................................................................................................17-7
17.7 Introduction to HTTPS....................................................................................................................17-7
17.7.1 HTTPS Example ....................................................................................................................17-8
17.7.2 Internet Explorer Warning Messages .......................................................................................17-8
17.7.3 Netscape Navigator Warning Messages...................................................................................17-8
17.7.4 Login Screen..........................................................................................................................17-9
17.8 Service Access Control ................................................................................................................17-11
17.9 Remote Management...................................................................................................................17-11
Chapter 18 Queuing Method.............................................................................................................................................................18-1
18.1 Introduction to Queuing..................................................................................................................18-1
18.1.1 Strictly Priority ......................................................................................................................18-1
18.1.2 Weighted Fair Scheduling.......................................................................................................18-1
18.2 Configuring Queuing ......................................................................................................................18-1
Chapter 19 Classifier...........................................................................................................................................................................19-1
19.1 About the Classifier and QoS..........................................................................................................19-1
19.2 Configuring the Classifier ...............................................................................................................19-1
19.3 Viewing and Editing Classifier Configuration ....................................................................................19-4
19.4 Classifier Example .........................................................................................................................19-5
Chapter 20 Policy Rule .......................................................................................................................................................................20-1