ZyXEL Communications GS-3012F/3012 Switch User Manual


 
List of Figures
GS-3012/GS-3012F User’s Guide
24
Figure 125 Global DHCP Relay Network Example ............................................................................. 222
Figure 126 DHCP Relay Configuration Example ................................................................................. 222
Figure 127 IP Application > DHCP > VLAN ....................................................................................... 223
Figure 128 DHCP Relay for Two VLANs ............................................................................................. 224
Figure 129 DHCP Relay for Two VLANs Configuration Example ........................................................ 224
Figure 130 Management > Maintenance ............................................................................................. 227
Figure 131 Load Factory Default: Start ................................................................................................ 228
Figure 132 Reboot System: Confirmation ........................................................................................... 229
Figure 133 Management > Maintenance > Firmware Upgrade .......................................................... 229
Figure 134 Management > Maintenance > Restore Configuration ...................................................... 230
Figure 135 Management > Maintenance > Backup Configuration ...................................................... 230
Figure 136 Management > Access Control ......................................................................................... 233
Figure 137 SNMP Management Model .............................................................................................. 234
Figure 138 Management > Access Control > SNMP ........................................................................... 240
Figure 139 Management > Access Control > SNMP > Trap Group .................................................... 242
Figure 140 Management > Access Control > Logins .......................................................................... 243
Figure 141 SSH Communication Example ...........................................................................................244
Figure 142 How SSH Works ................................................................................................................. 244
Figure 143 HTTPS Implementation ...................................................................................................... 246
Figure 144 Security Alert Dialog Box (Internet Explorer) ...................................................................... 246
Figure 145 Security Certificate 1 (Netscape) ........................................................................................ 247
Figure 146 Security Certificate 2 (Netscape) ........................................................................................ 247
Figure 147 Example: Lock Denoting a Secure Connection .................................................................. 248
Figure 148 Management > Access Control > Service Access Control ................................................ 248
Figure 149 Management > Access Control > Remote Management .................................................. 249
Figure 150 Management > Diagnostic ................................................................................................. 251
Figure 151 Management > Syslog ....................................................................................................... 254
Figure 152 Management > Syslog > Syslog Server Setup .................................................................. 255
Figure 153 Clustering Application Example ......................................................................................... 258
Figure 154 Management > Cluster Management: Status .................................................................... 258
Figure 155 Cluster Management: Cluster Member Web Configurator Screen .................................... 259
Figure 156 Example: Uploading Firmware to a Cluster Member Switch ............................................. 260
Figure 157 Management > Cluster Management > Configuration ..................................................... 261
Figure 158 MAC Table Flowchart ........................................................................................................ 263
Figure 159 Management > MAC Table ................................................................................................ 264
Figure 160 Management > ARP Table ................................................................................................ 266
Figure 161 Management > Configure Clone .......................................................................................267
Figure 162 Network Number and Host ID ............................................................................................ 284
Figure 163 Subnetting Example: Before Subnetting ............................................................................ 286
Figure 164 Subnetting Example: After Subnetting ............................................................................... 287
Figure 165 Conflicting Computer IP Addresses Example .................................................................... 291
Figure 166 Conflicting Computer IP Addresses Example .................................................................... 291
Figure 167 Conflicting Computer and Router IP Addresses Example .................................................. 292