ZyXEL Communications ES-3124PWR Switch User Manual


 
ES-3124PWR Ethernet Switch
xvi Lists of Figures and Charts
Figure 8-2 Static MAC Forwarding: Summary Table ...............................................................................................................................8-2
Figure 9-1 Filtering ......................................................................................................................................................................................... 9-1
Figure 9-2 Filtering: Summary Table ........................................................................................................................................................... 9-2
Figure 10-1 Spanning Tree Protocol: Status............................................................................................................................................. 10-3
Figure 10-2 Spanning Tree Protocol: Configuring .................................................................................................................................. 10-5
Figure 11-1 Bandwidth Control .................................................................................................................................................................. 11-1
Figure 12-1 Broadcast Storm Control........................................................................................................................................................ 12-2
Figure 13-1 Mirroring................................................................................................................................................................................... 13-2
Figure 14-1 Aggregation ID......................................................................................................................................................................... 14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status....................................................................................................... 14-2
Figure 14-3 Link Aggregation: Configuration.......................................................................................................................................... 14-4
Figure 15-1 RADIUS Server....................................................................................................................................................................... 15-1
Figure 15-2 Port Authentication.................................................................................................................................................................. 15-2
Figure 15-3 Port Authentication: RADIUS............................................................................................................................................... 15-2
Figure 15-4 Port Authentication: 802.1x................................................................................................................................................... 15-3
Figure 16-1 Port Security............................................................................................................................................................................. 16-2
Figure 17-1 Access Control......................................................................................................................................................................... 17-1
Figure 17-2 Console Port Priority............................................................................................................................................................... 17-1
Figure 17-3 SNMP Management Model ................................................................................................................................................... 17-2
Figure 17-4 Access Control: SNMP........................................................................................................................................................... 17-4
Figure 17-5 Access Control: Logins........................................................................................................................................................... 17-5
Figure 17-6 SSH Communication Example.............................................................................................................................................. 17-6
Figure 17-7How SSH Works ....................................................................................................................................................................... 17-6
Figure 17-8 HTTPS Implementation ......................................................................................................................................................... 17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ................................................................................................................... 17-8
Figure 17-10 Security Certificate 1 (Netscape)........................................................................................................................................ 17-9
Figure 17-11 Security Certificate 2 (Netscape)........................................................................................................................................ 17-9
Figure 17-12 Main Screen (Internet Explorer) .......................................................................................................................................17-10
Figure 17-13 Main Screen (Netscape).....................................................................................................................................................17-10
Figure 17-14 Access Control: Service Access Control.........................................................................................................................17-11
Figure 17-15 Access Control: Remote Management.............................................................................................................................17-12
Figure 18-1 Queuing Method...................................................................................................................................................................... 18-2
Figure 19-1 Classifier ................................................................................................................................................................................... 19-2
Figure 19-2 Classifier: Summary Table ..................................................................................................................................................... 19-4
Figure 19-3 Classifier: Example ................................................................................................................................................................. 19-6
Figure 20-1 Policy ......................................................................................................................................................................................... 20-2
Figure 20-2 Policy: Summary Table .......................................................................................................................................................... 20-4
Figure 20-3 Policy Example ........................................................................................................................................................................ 20-6
Figure 21-1 VLAN Stacking Example ....................................................................................................................................................... 21-2
Figure 21-2 VLAN Stacking ....................................................................................................................................................................... 21-4
Figure 22-1 DHCP Relay ............................................................................................................................................................................. 22-2
Figure 23-1 Static Routing........................................................................................................................................................................... 23-1
Figure 23-2 Static Routing: Summary Table ............................................................................................................................................ 23-2
Figure 24-1 Maintenance ............................................................................................................................................................................. 24-1
Figure 24-2 Firmware Upgrade................................................................................................................................................................... 24-1