ZyXEL Communications ZyXEL Dimension ES-3124 User Manual
Page 15

Dimension ES-3124 Ethernet Switch
Lists of Figures and Charts
xv
Figure 7-8 Port Based VLAN Setup (All Connected) ...............................................................................................................7-11
Figure 7-9 Port Based VLAN Setup (Port isolation).................................................................................................................7-12
Figure 8-1 Static MAC Forwarding.............................................................................................................................................8-1
Figure 8-2 Static MAC Forwarding: Summary Table .................................................................................................................8-2
Figure 9-1 Filtering .....................................................................................................................................................................9-1
Figure 9-2 Filtering: Summary Table ..........................................................................................................................................9-2
Figure 10-1 Spanning Tree Protocol: Status..............................................................................................................................10-3
Figure 10-2 Spanning Tree Protocol: Configuring ....................................................................................................................10-5
Figure 11-1 Bandwidth Control.................................................................................................................................................11-2
Figure 12-1 Broadcast Storm Control .......................................................................................................................................12-2
Figure 13-1 Mirroring ...............................................................................................................................................................13-2
Figure 14-1 Aggregation ID ......................................................................................................................................................14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status............................................................................................14-2
Figure 14-3 Link Aggregation: Configuration...........................................................................................................................14-4
Figure 15-1 RADIUS Server.....................................................................................................................................................15-1
Figure 15-2 Port Authentication ................................................................................................................................................15-2
Figure 15-3 Port Authentication: RADIUS ...............................................................................................................................15-2
Figure 15-4 Port Authentication: 802.1x ...................................................................................................................................15-3
Figure 16-1 Port Security ..........................................................................................................................................................16-2
Figure 17-1 Access Control.......................................................................................................................................................17-1
Figure 17-2 Console Port Priority .............................................................................................................................................17-1
Figure 17-3 SNMP Management Model ...................................................................................................................................17-2
Figure 17-4 Access Control: SNMP ..........................................................................................................................................17-4
Figure 17-5 Access Control: Logins..........................................................................................................................................17-5
Figure 17-6 SSH Communication Example ..............................................................................................................................17-6
Figure 17-7How SSH Works.....................................................................................................................................................17-6
Figure 17-8 HTTPS Implementation.........................................................................................................................................17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer).......................................................................................................17-8
Figure 17-10 Security Certificate 1 (Netscape).........................................................................................................................17-9
Figure 17-11 Security Certificate 2 (Netscape) .........................................................................................................................17-9
Figure 17-12 Main Screen (Internet Explorer) ........................................................................................................................17-10
Figure 17-13 Main Screen (Netscape).....................................................................................................................................17-10
Figure 17-14 Access Control: Service Access Control............................................................................................................17-11
Figure 17-15 Access Control: Remote Management...............................................................................................................17-12
Figure 18-1 Queuing Method ....................................................................................................................................................18-2
Figure 19-1 Classifier................................................................................................................................................................19-2
Figure 19-2 Classifier: Summary Table.....................................................................................................................................19-4
Figure 19-3 Classifier: Example................................................................................................................................................19-6
Figure 20-1 Policy.....................................................................................................................................................................20-2
Figure 20-2 Policy: Summary Table..........................................................................................................................................20-4
Figure 20-3 Policy Example......................................................................................................................................................20-6
Figure 21-1 VLAN Stacking Example ......................................................................................................................................21-2
Figure 21-2 VLAN Stacking .....................................................................................................................................................21-4
Figure 22-1 Multicast Status .....................................................................................................................................................22-2
Figure 22-2 Multicast Setting....................................................................................................................................................22-3