ZyXEL Communications ZyXEL Dimension GS-3012 User Manual
Page 20

GS-3012/GS-3012F User’s Guide
xx
Lists of Tables and Charts
Table 15-1 Port Authentication: RADIUS................................................................................................................. 15-2
Table 15-2 Port Authentication: 802.1x.................................................................................................................... 15-3
Table 16-1 Port Security .......................................................................................................................................... 16-2
Table 17-1 Physical Queue Priority ......................................................................................................................... 17-1
Table 17-2 Queuing Method .................................................................................................................................... 17-3
Table 18-1 Classifier ................................................................................................................................................ 18-2
Table 18-2 Classifier: Summary Table..................................................................................................................... 18-4
Table 18-3 Common Ethernet Types and Protocol Number.................................................................................... 18-5
Table 18-4 Common IP Ports .................................................................................................................................. 18-5
Table 19-1 Policy ..................................................................................................................................................... 19-3
Table 19-2 Policy: Summary Table .......................................................................................................................... 19-5
Table 20-1 Multicast Status...................................................................................................................................... 20-2
Table 20-2 Multicast Setting .................................................................................................................................... 20-3
Table 20-3 Multicast: IGMP Filtering Profile ............................................................................................................ 20-5
Table 20-4 MVR....................................................................................................................................................... 20-8
Table 20-5 MVR Group Configuration ...................................................................................................................20-10
Table 21-1 Static Routing......................................................................................................................................... 21-1
Table 21-2 Static Routing: Summary Table ............................................................................................................. 21-2
Table 22-1 DHCP Relay .......................................................................................................................................... 22-2
Table 23-1 Filename Conventions........................................................................................................................... 23-4
Table 23-2 General Commands for GUI-based FTP Clients ................................................................................... 23-5
Table 24-1 Access Control Overview....................................................................................................................... 24-1
Table 24-2 SNMP Commands ................................................................................................................................. 24-3
Table 24-3 SNMP Traps........................................................................................................................................... 24-3
Table 24-4 Access Control: SNMP .......................................................................................................................... 24-4
Table 24-5 Access Control: Logins .......................................................................................................................... 24-5
Table 24-6 Access Control: Service Access Control.............................................................................................. 24-11
Table 24-7 Access Control: Remote Management................................................................................................24-12
Table 25-1 Diagnostic .............................................................................................................................................. 25-1
Table 26-1 Syslog Severity Levels .......................................................................................................................... 26-1
Table 26-2 Syslog Setup.......................................................................................................................................... 26-2
Table 26-3 Syslog Server Setup.............................................................................................................................. 26-3