ZyXEL Communications GS-4012 Switch User Manual


 
Table of Contents
GS-4012F/4024 User’s Guide
19
34.3 VRRP Configuration .......................................................................................................269
34.3.1 IP Interface Setup ................................................................................................. 269
34.3.2 VRRP Parameters ................................................................................................. 270
34.3.3 Configuring VRRP Parameters .............................................................................. 271
34.4 VRRP Configuration Summary ........................................................................................ 272
34.5 VRRP Configuration Examples ...................................................................................... 272
34.5.1 One Subnet Network Example .............................................................................. 272
34.5.2 Two Subnets Example .......................................................................................... 274
Part V: Management, CLI, Troubleshooting...................................... 277
Chapter 35
Maintenance .......................................................................................................................... 279
35.1 The Maintenance Screen .............................................................................................. 279
35.2 Load Factory Default ...................................................................................................... 280
35.3 Save Configuration .......................................................................................................... 280
35.4 Reboot System ................................................................................................................ 281
35.5 Firmware Upgrade ........................................................................................................ 281
35.6 Restore a Configuration File ......................................................................................... 282
35.7 Backup a Configuration File ......................................................................................... 282
35.8 FTP Command Line ........................................................................................................ 283
35.8.1 Filename Conventions .......................................................................................... 283
35.8.2 FTP Command Line Procedure ............................................................................ 283
35.8.3 GUI-based FTP Clients .......................................................................................... 284
35.8.4 FTP Restrictions .................................................................................................... 284
Chapter 36
Access Control...................................................................................................................... 285
36.1 Access Control Overview ............................................................................................ 285
36.2 The Access Control Main Screen .................................................................................... 285
36.3 About SNMP .................................................................................................................. 286
36.3.1 SNMP v3 and Security ........................................................................................... 287
36.3.2 Supported MIBs ................................................................................................... 287
36.3.3 SNMP Traps .......................................................................................................... 287
36.3.4 Configuring SNMP ................................................................................................ 291
36.3.5 Configuring SNMP Trap Group ........................................................................... 293
36.3.6 Setting Up Login Accounts ................................................................................. 294
36.4 SSH Overview ................................................................................................................. 296
36.5 How SSH works ............................................................................................................... 296
36.6 SSH Implementation on the Switch ................................................................................. 297
36.6.1 Requirements for Using SSH ................................................................................. 297