ZyXEL Communications ZyXEL Dimension ES-3148 User Manual page 25

Intelligent layer 2+ switch 48-port fast ethernet + 2 gigabit ethernet ports 2 gbe dual personality interfaces (copper/sfp)
Hide thumbs Also See for ZyXEL Dimension ES-3148:
Table of Contents

Advertisement

ES-3148 User's Guide
Figure 82 Static Routing ........................................................................................ 181
Figure 83 DiffServ ................................................................................................. 183
Figure 84 DiffServ ................................................................................................. 184
Figure 85 Maintenance ......................................................................................... 187
Figure 86 Load Factory Default: Start ................................................................... 188
Figure 87 Reboot System: Confirmation ............................................................... 189
Figure 88 Firmware Upgrade ................................................................................ 190
Figure 89 Restore Configuration ........................................................................... 190
Figure 90 Backup Configuration ............................................................................ 191
Figure 91 Access Control ...................................................................................... 195
Figure 92 SNMP Management Model .................................................................. 196
Figure 93 Access Control: SNMP ......................................................................... 198
Figure 94 Access Control: Logins ......................................................................... 199
Figure 95 SSH Communication Example ............................................................... 200
Figure 96 How SSH Works .................................................................................... 201
Figure 97 HTTPS Implementation .......................................................................... 202
Figure 98 Security Alert Dialog Box (Internet Explorer) ......................................... 203
Figure 99 Security Certificate 1 (Netscape) ........................................................... 204
Figure 100 Security Certificate 2 (Netscape) ......................................................... 204
Figure 101 Example: Lock Denoting a Secure Connection ................................... 205
Figure 102 Access Control: Service Access Control ............................................. 206
Figure 103 Access Control: Remote Management ............................................... 207
Figure 104 Diagnostic ........................................................................................... 209
Figure 105 Syslog ................................................................................................. 212
Figure 106 Syslog: Server Setup .......................................................................... 213
Figure 107 Clustering Application Example .......................................................... 216
Figure 108 Cluster Management: Status ............................................................... 217
Figure 111 Clustering Management Configuration ............................................... 220
Figure 112 MAC Table Flowchart .......................................................................... 223
Figure 113 MAC Table ........................................................................................... 224
Figure 114 ARP Table ........................................................................................... 226
Figure 115 Configure Clone .................................................................................. 227
Figure 117 Pop-up Blocker ..................................................................................... 304
Figure 118 Internet Options .................................................................................... 305
Figure 119 Internet Options .................................................................................... 306
Figure 120 Pop-up Blocker Settings ...................................................................... 307
Figure 121 Internet Options ................................................................................... 308
Figure 122 Security Settings - Java Scripting ........................................................ 309
Figure 123 Security Settings - Java ....................................................................... 310
Figure 124 Java (Sun) ............................................................................................ 311
List of Figures
25

Advertisement

Table of Contents
loading

Table of Contents