ZyXEL Communications GS-4024 Switch User Manual


 
List of Figures
GS-4012F/4024 User’s Guide
29
Figure 168 Maintenance ..................................................................................................................... 279
Figure 169 Load Factory Default: Start ................................................................................................ 280
Figure 170 Reboot System: Confirmation ........................................................................................... 281
Figure 171 Firmware Upgrade ............................................................................................................ 281
Figure 172 Restore Configuration ....................................................................................................... 282
Figure 173 Backup Configuration ........................................................................................................ 282
Figure 174 Access Control .................................................................................................................. 285
Figure 175 SNMP Management Model .............................................................................................. 286
Figure 176 Access Control: SNMP ...................................................................................................... 292
Figure 177 Access Control: SNMP: Trap Group .................................................................................. 294
Figure 178 Access Control: Logins ...................................................................................................... 295
Figure 179 SSH Communication Example ...........................................................................................296
Figure 180 How SSH Works ................................................................................................................. 296
Figure 181 HTTPS Implementation ...................................................................................................... 298
Figure 182 Security Alert Dialog Box (Internet Explorer) ...................................................................... 298
Figure 183 Security Certificate 1 (Netscape) ........................................................................................ 299
Figure 184 Security Certificate 2 (Netscape) ........................................................................................ 299
Figure 185 Example: Lock Denoting a Secure Connection .................................................................. 300
Figure 186 Access Control: Service Access Control ........................................................................... 300
Figure 187 Access Control: Remote Management .............................................................................. 301
Figure 188 Diagnostic .......................................................................................................................... 303
Figure 189 Syslog ................................................................................................................................ 306
Figure 190 Syslog: Server Setup ......................................................................................................... 307
Figure 191 Clustering Application Example ......................................................................................... 310
Figure 192 Cluster Management: Status ............................................................................................. 310
Cluster Management: Cluster Member Web Configurator Screen 311
Example: Uploading Firmware to a Cluster Member Switch 312
Figure 195 Clustering Management Configuration ............................................................................. 313
Figure 196 MAC Table Flowchart ........................................................................................................ 315
Figure 197 MAC Table ......................................................................................................................... 316
Figure 198 IP Table Flowchart ............................................................................................................. 317
Figure 199 IP Table ............................................................................................................................. 318
Figure 200 ARP Table ......................................................................................................................... 320
Figure 201 Routing Table Status ......................................................................................................... 321
Figure 202 Configure Clone ................................................................................................................ 323
Figure 203 no port-access-authenticator Command Example ............................................................ 389
Figure 204 Pop-up Blocker ................................................................................................................... 416
Figure 205 Internet Options ................................................................................................................. 417
Figure 206 Internet Options .................................................................................................................. 418
Figure 207 Pop-up Blocker Settings ..................................................................................................... 418
Figure 208 Internet Options .................................................................................................................. 419
Figure 209 Security Settings - Java Scripting ....................................................................................... 420
Figure 210 Security Settings - Java ...................................................................................................... 420