ZyXEL Communications GS-2750 User Manual

Page 24

Advertising
background image

List of Figures

GS-2750 User’s Guide

24

Figure 125 Global DHCP Relay Network Example ............................................................................. 237
Figure 126 DHCP Relay Configuration Example ................................................................................. 238
Figure 127 IP Application > DHCP > VLAN ....................................................................................... 239
Figure 128 DHCP Relay for Two VLANs ............................................................................................. 241
Figure 129 DHCP Relay for Two VLANs Configuration Example ........................................................ 241
Figure 130 VRRP: Example 1 ............................................................................................................. 243
Figure 131 IP Application > VRRP Status ........................................................................................... 244
Figure 132 IP Application > VRRP Configuration > IP Interface ......................................................... 245
Figure 133 IP Application > VRRP Configuration > VRRP Parameters .............................................. 247
Figure 134 VRRP Configuration: Summary ......................................................................................... 248
Figure 135 VRRP Configuration Example: One Virtual Router Network ............................................. 248
Figure 136 VRRP Example 1: VRRP Parameter Settings on Switch A ............................................... 249
Figure 137 VRRP Example 1: VRRP Parameter Settings on Switch B ............................................... 249
Figure 138 VRRP Example 1: VRRP Status on Switch A ................................................................... 249
Figure 139 VRRP Example 1: VRRP Status on Switch B ................................................................... 249
Figure 140 VRRP Configuration Example: Two Virtual Router Network ............................................. 250
Figure 141 VRRP Example 2: VRRP Parameter Settings for VR2 on Switch A ................................. 250
Figure 142 VRRP Example 2: VRRP Parameter Settings for VR2 on Switch B ................................. 250
Figure 143 VRRP Example 2: VRRP Status on Switch A ................................................................... 251
Figure 144 VRRP Example 2: VRRP Status on Switch B ................................................................... 251
Figure 145 Management > Maintenance ............................................................................................ 255
Figure 146 Load Factory Default: Start ................................................................................................ 256
Figure 147 Reboot System: Confirmation ........................................................................................... 257
Figure 148 Management > Maintenance > Firmware Upgrade .......................................................... 257
Figure 149 Management > Maintenance > Restore Configuration ...................................................... 258
Figure 150 Management > Maintenance > Backup Configuration ...................................................... 258
Figure 151 Management > Access Control ......................................................................................... 261
Figure 152 SNMP Management Model .............................................................................................. 262
Figure 153 Management > Access Control > SNMP ........................................................................... 267
Figure 154 Management > Access Control > SNMP > Trap Group .................................................... 269
Figure 155 Management > Access Control > Logins .......................................................................... 270
Figure 156 SSH Communication Example ........................................................................................... 271
Figure 157 How SSH Works ................................................................................................................. 271
Figure 158 HTTPS Implementation ...................................................................................................... 273
Figure 159 Security Alert Dialog Box (Internet Explorer) ...................................................................... 273
Figure 160 Security Certificate 1 (Netscape) ........................................................................................ 274
Figure 161 Security Certificate 2 (Netscape) ........................................................................................ 274
Figure 162 Example: Lock Denoting a Secure Connection .................................................................. 275
Figure 163 Management > Access Control > Service Access Control ................................................. 275
Figure 164 Management > Access Control > Remote Management .................................................. 276
Figure 165 Management > Diagnostic ................................................................................................. 279
Figure 166 Management > Syslog ....................................................................................................... 282
Figure 167 Management > Syslog > Server Setup ............................................................................. 283

Advertising