ZyXEL Communications GS-4012 User Manual page 29

Intelligent layer 3+ switch
Table of Contents

Advertisement

Figure 168 Load Factory Default: Start ................................................................................................ 280
Figure 169 Reboot System: Confirmation ........................................................................................... 281
Figure 170 Firmware Upgrade ............................................................................................................ 281
Figure 171 Restore Configuration ....................................................................................................... 282
Figure 172 Backup Configuration ........................................................................................................ 282
Figure 173 Access Control .................................................................................................................. 285
Figure 174 SNMP Management Model .............................................................................................. 286
Figure 175 Access Control: SNMP ...................................................................................................... 292
Figure 176 Access Control: SNMP: Trap Group .................................................................................. 294
Figure 177 Access Control: Logins ...................................................................................................... 295
Figure 178 SSH Communication Example ........................................................................................... 296
Figure 179 How SSH Works ................................................................................................................. 296
Figure 180 HTTPS Implementation ...................................................................................................... 298
Figure 181 Security Alert Dialog Box (Internet Explorer) ...................................................................... 298
Figure 182 Security Certificate 1 (Netscape) ........................................................................................ 299
Figure 183 Security Certificate 2 (Netscape) ........................................................................................ 299
Figure 184 Example: Lock Denoting a Secure Connection .................................................................. 300
Figure 185 Access Control: Service Access Control ........................................................................... 300
Figure 186 Access Control: Remote Management .............................................................................. 301
Figure 187 Diagnostic .......................................................................................................................... 303
Figure 188 Syslog ................................................................................................................................ 306
Figure 189 Syslog: Server Setup ......................................................................................................... 307
Figure 190 Clustering Application Example ......................................................................................... 310
Figure 191 Cluster Management: Status ............................................................................................. 310
Figure 194 Clustering Management Configuration ............................................................................. 313
Figure 195 MAC Table Flowchart ........................................................................................................ 315
Figure 196 MAC Table ......................................................................................................................... 316
Figure 197 IP Table Flowchart ............................................................................................................. 317
Figure 198 IP Table ............................................................................................................................. 318
Figure 199 ARP Table ......................................................................................................................... 320
Figure 200 Routing Table Status ......................................................................................................... 321
Figure 201 Configure Clone ................................................................................................................ 323
Figure 202 no port-access-authenticator Command Example ............................................................ 389
Figure 203 Pop-up Blocker ................................................................................................................... 416
Figure 204 Internet Options ................................................................................................................. 417
Figure 205 Internet Options .................................................................................................................. 418
Figure 206 Pop-up Blocker Settings ..................................................................................................... 418
Figure 207 Internet Options .................................................................................................................. 419
Figure 208 Security Settings - Java Scripting ....................................................................................... 420
Figure 209 Security Settings - Java ...................................................................................................... 420
Figure 210 Java (Sun) .......................................................................................................................... 421
GS-4012F/4024 User's Guide
List of Figures
29

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gs-4012fGs-4024

Table of Contents