ZyXEL Communications GS-3012F/3012 Switch User Manual


 
Table of Contents
GS-3012/GS-3012F User’s Guide
18
28.6 Restore a Configuration File ......................................................................................... 230
28.7 Backup a Configuration File ......................................................................................... 230
28.8 FTP Command Line ........................................................................................................ 231
28.8.1 Filename Conventions .......................................................................................... 231
28.8.2 FTP Command Line Procedure ............................................................................ 231
28.8.3 GUI-based FTP Clients .......................................................................................... 232
28.8.4 FTP Restrictions .................................................................................................... 232
Chapter 29
Access Control...................................................................................................................... 233
29.1 Access Control Overview ............................................................................................ 233
29.2 The Access Control Main Screen .................................................................................... 233
29.3 About SNMP .................................................................................................................. 234
29.3.1 SNMP v3 and Security ........................................................................................... 235
29.3.2 Supported MIBs ................................................................................................... 235
29.3.3 SNMP Traps .......................................................................................................... 235
29.3.4 Configuring SNMP ................................................................................................ 239
29.3.5 Configuring SNMP Trap Group ........................................................................... 241
29.3.6 Setting Up Login Accounts ................................................................................. 242
29.4 SSH Overview ................................................................................................................. 244
29.5 How SSH works ............................................................................................................... 244
29.6 SSH Implementation on the Switch ................................................................................. 245
29.6.1 Requirements for Using SSH ................................................................................. 245
29.7 Introduction to HTTPS .....................................................................................................245
29.8 HTTPS Example .............................................................................................................. 246
29.8.1 Internet Explorer Warning Messages ..................................................................... 246
29.8.2 Netscape Navigator Warning Messages ................................................................ 247
29.8.3 The Main Screen .................................................................................................... 247
29.9 Service Port Access Control ......................................................................................... 248
29.10 Remote Management ............................................................................................... 249
Chapter 30
Diagnostic.............................................................................................................................. 251
30.1 Diagnostic ....................................................................................................................... 251
Chapter 31
Syslog .................................................................................................................................... 253
31.1 Syslog Overview .............................................................................................................. 253
31.2 Syslog Setup .................................................................................................................. 253
31.3 Syslog Server Setup ....................................................................................................... 254
Chapter 32
Cluster Management.............................................................................................................257