ZyXEL Communications GS-4024 User Manual

Page 29

Advertising
background image

List of Figures

GS-4012F/4024 User’s Guide

29

Figure 168 Maintenance ..................................................................................................................... 279

Figure 169 Load Factory Default: Start ................................................................................................ 280

Figure 170 Reboot System: Confirmation ........................................................................................... 281

Figure 171 Firmware Upgrade ............................................................................................................ 281

Figure 172 Restore Configuration ....................................................................................................... 282

Figure 173 Backup Configuration ........................................................................................................ 282

Figure 174 Access Control .................................................................................................................. 285

Figure 175 SNMP Management Model .............................................................................................. 286

Figure 176 Access Control: SNMP ...................................................................................................... 292

Figure 177 Access Control: SNMP: Trap Group .................................................................................. 294

Figure 178 Access Control: Logins ...................................................................................................... 295

Figure 179 SSH Communication Example ........................................................................................... 296

Figure 180 How SSH Works ................................................................................................................. 296

Figure 181 HTTPS Implementation ...................................................................................................... 298

Figure 182 Security Alert Dialog Box (Internet Explorer) ...................................................................... 298

Figure 183 Security Certificate 1 (Netscape) ........................................................................................ 299

Figure 184 Security Certificate 2 (Netscape) ........................................................................................ 299

Figure 185 Example: Lock Denoting a Secure Connection .................................................................. 300

Figure 186 Access Control: Service Access Control ........................................................................... 300

Figure 187 Access Control: Remote Management .............................................................................. 301

Figure 188 Diagnostic .......................................................................................................................... 303

Figure 189 Syslog ................................................................................................................................ 306

Figure 190 Syslog: Server Setup ......................................................................................................... 307

Figure 191 Clustering Application Example ......................................................................................... 310

Figure 192 Cluster Management: Status ............................................................................................. 310

Cluster Management: Cluster Member Web Configurator Screen 311

Example: Uploading Firmware to a Cluster Member Switch 312

Figure 195 Clustering Management Configuration ............................................................................. 313

Figure 196 MAC Table Flowchart ........................................................................................................ 315

Figure 197 MAC Table ......................................................................................................................... 316

Figure 198 IP Table Flowchart ............................................................................................................. 317

Figure 199 IP Table ............................................................................................................................. 318

Figure 200 ARP Table ......................................................................................................................... 320

Figure 201 Routing Table Status ......................................................................................................... 321

Figure 202 Configure Clone ................................................................................................................ 323

Figure 203 no port-access-authenticator Command Example ............................................................ 389

Figure 204 Pop-up Blocker ................................................................................................................... 416

Figure 205 Internet Options ................................................................................................................. 417

Figure 206 Internet Options .................................................................................................................. 418

Figure 207 Pop-up Blocker Settings ..................................................................................................... 418

Figure 208 Internet Options .................................................................................................................. 419

Figure 209 Security Settings - Java Scripting ....................................................................................... 420

Figure 210 Security Settings - Java ...................................................................................................... 420

Advertising
This manual is related to the following products: