ZyXEL Communications GS-2750 User Manual

Page 19

Advertising
background image

Table of Contents

GS-2750 User’s Guide

19

32.2 The Access Control Main Screen .................................................................................... 261
32.3 About SNMP .................................................................................................................. 262

32.3.1 SNMP v3 and Security ........................................................................................... 263
32.3.2 Supported MIBs ................................................................................................... 263
32.3.3 SNMP Traps .......................................................................................................... 263
32.3.4 Configuring SNMP .............................................................................................. 266
32.3.5 Configuring SNMP Trap Group ........................................................................... 268
32.3.6 Setting Up Login Accounts ................................................................................. 269

32.4 SSH Overview ................................................................................................................. 271
32.5 How SSH works ............................................................................................................... 271
32.6 SSH Implementation on the Switch ................................................................................. 272

32.6.1 Requirements for Using SSH ................................................................................. 272

32.7 Introduction to HTTPS ..................................................................................................... 272
32.8 HTTPS Example .............................................................................................................. 273

32.8.1 Internet Explorer Warning Messages ..................................................................... 273
32.8.2 Netscape Navigator Warning Messages ................................................................ 274
32.8.3 The Main Screen .................................................................................................... 274

32.9 Service Port Access Control ......................................................................................... 275
32.10 Remote Management ............................................................................................... 276

Chapter 33
Diagnostic.............................................................................................................................. 279

33.1 Diagnostic ....................................................................................................................... 279

Chapter 34
Syslog .................................................................................................................................... 281

34.1 Syslog Overview .............................................................................................................. 281
34.2 Syslog Setup .................................................................................................................. 281
34.3 Syslog Server Setup ....................................................................................................... 282

Chapter 35
Cluster Management.............................................................................................................285

35.1 Clustering Management Status Overview ...................................................................... 285
35.2 Cluster Management Status ........................................................................................... 286

35.2.1 Cluster Member Switch Management ................................................................... 287

35.3 Clustering Management Configuration .......................................................................... 288

Chapter 36
MAC Table.............................................................................................................................. 291

36.1 MAC Table Overview ...................................................................................................... 291
36.2 Viewing the MAC Table ................................................................................................... 292

Chapter 37
IP Table .................................................................................................................................. 293

Advertising