ZyXEL Communications Dimension GS-3012F User Manual page 14

Gigabit ethernet switch
Hide thumbs Also See for Dimension GS-3012F:
Table of Contents

Advertisement

GS-3012F User's Guide
Figure 11-1 Bandwidth Control ................................................................................................................................ 11-1
Figure 12-1 Broadcast Storm Control...................................................................................................................... 12-1
Figure 13-1 Mirroring ............................................................................................................................................... 13-1
Figure 14-1 Aggregation ID ..................................................................................................................................... 14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status ............................................................................ 14-2
Figure 14-3 Link Aggregation: Configuration........................................................................................................... 14-4
Figure 15-1 RADIUS Server .................................................................................................................................... 15-1
Figure 15-2 Port Authentication ............................................................................................................................... 15-1
Figure 15-3 Port Authentication: RADIUS ............................................................................................................... 15-2
Figure 15-4 Port Authentication: 802.1x .................................................................................................................. 15-3
Figure 16-1 Port Security......................................................................................................................................... 16-1
Figure 17-1 Access Control ..................................................................................................................................... 17-1
Figure 17-2 Console Port Priority ............................................................................................................................ 17-1
Figure 17-3 SNMP Management Model.................................................................................................................. 17-2
Figure 17-4 Access Control: SNMP......................................................................................................................... 17-4
Figure 17-5 Access Control: Logins ........................................................................................................................ 17-5
Figure 17-6 SSH Communication Example............................................................................................................. 17-6
Figure 17-7How SSH Works ................................................................................................................................... 17-6
Figure 17-8 HTTPS Implementation........................................................................................................................ 17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ....................................................................................... 17-8
Figure 17-10 Security Certificate 1 (Netscape) ....................................................................................................... 17-9
Figure 17-11 Security Certificate 2 (Netscape) ....................................................................................................... 17-9
Figure 17-12 Main Screen (Internet Explorer)....................................................................................................... 17-10
Figure 17-13 Main Screen (Netscape) .................................................................................................................. 17-10
Figure 17-14 Access Control: Service Access Control.......................................................................................... 17-11
Figure 17-15 Access Control: Remote Management ............................................................................................ 17-11
Figure 18-1 Queuing Method................................................................................................................................... 18-2
Figure 19-1 Classifier .............................................................................................................................................. 19-2
Figure 19-2 Classifier: Summary Table ................................................................................................................... 19-4
Figure 19-3 Classifier: Example .............................................................................................................................. 19-6
Figure 20-1 Policy.................................................................................................................................................... 20-2
Figure 20-2 Policy: Summary Table......................................................................................................................... 20-4
Figure 20-3 Policy Example..................................................................................................................................... 20-6
Figure 21-1 DHCP Relay......................................................................................................................................... 21-2
Figure 22-1 Static Routing ....................................................................................................................................... 22-1
Figure 22-2 Static Routing: Summary Table............................................................................................................ 22-2
Figure 23-1 Maintenance......................................................................................................................................... 23-1
Figure 23-2 Firmware Upgrade ............................................................................................................................... 23-1
Figure 23-3 Restore Configuration .......................................................................................................................... 23-2
Figure 23-4 Backup Configuration........................................................................................................................... 23-2
Figure 23-5 Confirm Load factory Defaults ............................................................................................................. 23-3
Figure 23-6 Restart Switch After Load Factory Defaults ......................................................................................... 23-3
Figure 23-7 Confirm Restart The Switch ................................................................................................................. 23-3
Figure 24-1 Diagnostic ............................................................................................................................................ 24-1
Figure 25-1 Clustering Application Example ........................................................................................................... 25-1
xiv
Lists of Figures

Advertisement

Table of Contents
loading

Table of Contents