Part iv: ip application, Part v: management – ZyXEL Communications ES-315 User Manual

Page 14

Advertising
background image

Table of Contents

ES-315/ES-315-F User’s Guide

14

Part IV: IP Application............................................................................ 85

Chapter 14
Static Route ............................................................................................................................. 87

14.1 Static Routing Overview .................................................................................................... 87
14.2 Configuring Static Routing ................................................................................................ 87

Part V: Management............................................................................... 91

Chapter 15
Maintenance ............................................................................................................................ 93

15.1 The Maintenance Screen ................................................................................................ 93
15.2 Load Factory Default ........................................................................................................ 94
15.3 Save Configuration ............................................................................................................ 94
15.4 Reboot System .................................................................................................................. 94
15.5 Firmware Upgrade .......................................................................................................... 95
15.6 Restore a Configuration File ........................................................................................... 95
15.7 Backup a Configuration File ........................................................................................... 96
15.8 FTP Command Line .......................................................................................................... 96

15.8.1 Filename Conventions ............................................................................................ 97
15.8.2 FTP Command Line Procedure .............................................................................. 97
15.8.3 GUI-based FTP Clients ............................................................................................ 98
15.8.4 FTP Restrictions ...................................................................................................... 98

Chapter 16
Access Control........................................................................................................................ 99

16.1 Access Control Overview .............................................................................................. 99
16.2 The Access Control Main Screen ...................................................................................... 99
16.3 About SNMP .................................................................................................................. 100

16.3.1 Supported MIBs ................................................................................................... 101
16.3.2 SNMP Traps .......................................................................................................... 101
16.3.3 Configuring SNMP ................................................................................................ 103
16.3.4 Setting Up Login Accounts ................................................................................. 104

16.4 SSH Overview ................................................................................................................. 105
16.5 How SSH works ............................................................................................................... 105
16.6 SSH Implementation on the Switch ................................................................................. 106

16.6.1 Requirements for Using SSH ................................................................................. 106

16.7 Introduction to HTTPS ..................................................................................................... 107
16.8 HTTPS Example .............................................................................................................. 107

16.8.1 Internet Explorer Warning Messages ..................................................................... 108
16.8.2 Netscape Navigator Warning Messages ................................................................ 108

Advertising