ZyXEL Communications VES-1616F-3X Switch User Manual


 
List of Figures
VES-1616F-3x Series User’s Guide
23
Figure 82 Backup Configuration .......................................................................................................... 175
Figure 83 Access Control .................................................................................................................... 180
Figure 84 SNMP Management Model ................................................................................................. 180
Figure 85 Access Control: SNMP ........................................................................................................ 182
Figure 86 Access Control: Logins ........................................................................................................ 183
Figure 87 SSH Communication Example ............................................................................................. 184
Figure 88 How SSH Works ................................................................................................................... 184
Figure 89 SSH Login Example ............................................................................................................ 186
Figure 90 HTTPS Implementation ........................................................................................................ 187
Figure 91 Security Alert Dialog Box (Internet Explorer) ........................................................................187
Figure 92 Security Certificate 1 (Netscape) .......................................................................................... 188
Figure 93 Security Certificate 2 (Netscape) .......................................................................................... 188
Figure 94 Example: Lock Denoting a Secure Connection .................................................................... 189
Figure 95 Access Control: Service Access Control ............................................................................. 189
Figure 96 Access Control: Remote Management ................................................................................ 190
Figure 97 Diagnostic ............................................................................................................................ 191
Figure 98 Syslog Setup ....................................................................................................................... 194
Figure 99 Syslog Server Setup ............................................................................................................ 195
Figure 100 Clustering Application Example ......................................................................................... 197
Figure 101 Cluster Management Status .............................................................................................. 198
Figure 102 Cluster Management: Cluster Member Web Configurator Screen .................................... 199
Figure 103 Example: Uploading Firmware to a Cluster Member Switch ............................................. 199
Figure 104 Clustering Management Configuration ............................................................................. 200
Figure 105 MAC Table Flowchart ........................................................................................................ 203
Figure 106 MAC Table ......................................................................................................................... 204
Figure 107 ARP Table ......................................................................................................................... 206
Figure 108 Pop-up Blocker ................................................................................................................... 269
Figure 109 Internet Options ................................................................................................................. 269
Figure 110 Internet Options .................................................................................................................. 270
Figure 111 Pop-up Blocker Settings ..................................................................................................... 270
Figure 112 Internet Options .................................................................................................................. 271
Figure 113 Security Settings - Java Scripting ....................................................................................... 272
Figure 114 Security Settings - Java ...................................................................................................... 272
Figure 115 Java (Sun) .......................................................................................................................... 273
Figure 116 Hardware Telco-50 Pin Assignments .................................................................................. 279
Figure 117 Telco-50 Cable VDSL Telco-50 Pin Assignments ............................................................... 280
Figure 118 Telco-50 Cable POTS/ISDN Telco-50 Pin Assignments ..................................................... 280
Figure 119 Console Cable DB-9 End Pin Layout ................................................................................. 281
Figure 120 Network Number and Host ID ............................................................................................ 286
Figure 121 Subnetting Example: Before Subnetting ............................................................................ 288
Figure 122 Subnetting Example: After Subnetting ............................................................................... 289
Figure 123 Conflicting Computer IP Addresses Example .................................................................... 293
Figure 124 Conflicting Computer IP Addresses Example .................................................................... 293