ZyXEL Communications VDSL SWITCH VES-1616F-3X User Manual

Page 15

Advertising
background image

Table of Contents

VES-1616F-3x Series User’s Guide

15

Chapter 26
Access Control...................................................................................................................... 179

26.1 Access Control Overview ................................................................................................ 179
26.2 The Access Control Main Screen .................................................................................... 179
26.3 About SNMP .................................................................................................................. 180

26.3.1 Supported MIBs ..................................................................................................... 181
26.3.2 SNMP Traps ........................................................................................................... 181
26.3.3 Configuring SNMP ................................................................................................. 182

26.4 Setting Up Login Accounts ............................................................................................. 182
26.5 SSH Overview ................................................................................................................. 184
26.6 How SSH works ............................................................................................................... 184
26.7 SSH Implementation on the Switch ................................................................................. 185

26.7.1 Requirements for Using SSH ................................................................................. 185
26.7.2 SSH Login Example ............................................................................................... 185

26.8 Introduction to HTTPS ..................................................................................................... 186
26.9 HTTPS Example .............................................................................................................. 187

26.9.1 Internet Explorer Warning Messages ..................................................................... 187
26.9.2 Netscape Navigator Warning Messages ................................................................ 188
26.9.3 The Main Screen .................................................................................................... 188

26.10 Service Access Control ................................................................................................ 189
26.11 Remote Management ................................................................................................... 190

Chapter 27
Diagnostic.............................................................................................................................. 191

27.1 Diagnostic ....................................................................................................................... 191

Chapter 28
Syslog .................................................................................................................................... 193

28.1 Syslog Overview .............................................................................................................. 193
28.2 Syslog Setup .................................................................................................................. 193
28.3 Syslog Server Setup ....................................................................................................... 194

Chapter 29
Cluster Management.............................................................................................................197

29.1 Cluster Management Overview ...................................................................................... 197
29.2 Cluster Management Status ............................................................................................ 198

29.2.1 Cluster Member Switch Management .................................................................... 199

29.3 Configuring Cluster Management ................................................................................... 200

Chapter 30
MAC Table.............................................................................................................................. 203

30.1 MAC Table Overview ..................................................................................................... 203
30.2 Viewing the MAC Table .................................................................................................... 204

Advertising