ZyXEL Communications ZyXEL Dimension ES-4124 User Manual page 29

Intelligent layer 3+ switch
Hide thumbs Also See for ZyXEL Dimension ES-4124:
Table of Contents

Advertisement

List of Figures
Figure 168 Management > Maintenance ............................................................................................ 283
Figure 169 Load Factory Default: Start ................................................................................................ 284
Figure 170 Reboot System: Confirmation ........................................................................................... 285
Figure 171 Management > Maintenance > Firmware Upgrade .......................................................... 285
Figure 172 Management > Maintenance > Restore Configuration ...................................................... 286
Figure 173 Management > Maintenance > Backup Configuration ...................................................... 286
Figure 174 Management > Access Control ......................................................................................... 289
Figure 175 SNMP Management Model .............................................................................................. 290
Figure 176 Management > Access Control > SNMP ........................................................................... 295
Figure 177 Management > Access Control > SNMP > Trap Group .................................................... 297
Figure 178 Management > Access Control > Logins .......................................................................... 298
Figure 179 SSH Communication Example ........................................................................................... 299
Figure 180 How SSH Works ................................................................................................................. 299
Figure 181 HTTPS Implementation ...................................................................................................... 301
Figure 182 Security Alert Dialog Box (Internet Explorer) ...................................................................... 301
Figure 183 Security Certificate 1 (Netscape) ........................................................................................ 302
Figure 184 Security Certificate 2 (Netscape) ........................................................................................ 302
Figure 185 Example: Lock Denoting a Secure Connection .................................................................. 303
Figure 188 Management > Diagnostic ................................................................................................. 307
Figure 189 Management > Syslog ....................................................................................................... 310
Figure 190 Management > Syslog > Server Setup ..............................................................................311
Figure 191 Clustering Application Example ......................................................................................... 314
Figure 194 Example: Uploading Firmware to a Cluster Member Switch ............................................. 316
Figure 195 Management > Clustering Management > Configuration ................................................. 317
Figure 196 MAC Table Flowchart ........................................................................................................ 319
Figure 197 Management > MAC Table ................................................................................................ 320
Figure 198 IP Table Flowchart ............................................................................................................. 321
Figure 199 Management > IP Table .................................................................................................... 322
Figure 200 Management > ARP Table ................................................................................................ 324
.......................................................................................... 325
Figure 202 Management > Configure Clone ....................................................................................... 327
Figure 203 no port-access-authenticator Command Example ............................................................ 396
Figure 204 Pop-up Blocker ................................................................................................................... 426
Figure 205 Internet Options ................................................................................................................. 427
Figure 206 Internet Options .................................................................................................................. 428
Figure 207 Pop-up Blocker Settings ..................................................................................................... 428
Figure 208 Internet Options .................................................................................................................. 429
Figure 209 Security Settings - Java Scripting ....................................................................................... 430
Figure 210 Security Settings - Java ...................................................................................................... 430
29
ES-4124 User's Guide

Advertisement

Table of Contents
loading

Table of Contents