beautypg.com

ZyXEL Communications ZyXEL Dimension GS-3012 User Manual

Page 20

background image

GS-3012/GS-3012F User’s Guide

xx

Lists of Tables and Charts

Table 15-1 Port Authentication: RADIUS................................................................................................................. 15-2

Table 15-2 Port Authentication: 802.1x.................................................................................................................... 15-3

Table 16-1 Port Security .......................................................................................................................................... 16-2

Table 17-1 Physical Queue Priority ......................................................................................................................... 17-1

Table 17-2 Queuing Method .................................................................................................................................... 17-3

Table 18-1 Classifier ................................................................................................................................................ 18-2

Table 18-2 Classifier: Summary Table..................................................................................................................... 18-4

Table 18-3 Common Ethernet Types and Protocol Number.................................................................................... 18-5

Table 18-4 Common IP Ports .................................................................................................................................. 18-5

Table 19-1 Policy ..................................................................................................................................................... 19-3

Table 19-2 Policy: Summary Table .......................................................................................................................... 19-5

Table 20-1 Multicast Status...................................................................................................................................... 20-2

Table 20-2 Multicast Setting .................................................................................................................................... 20-3

Table 20-3 Multicast: IGMP Filtering Profile ............................................................................................................ 20-5

Table 20-4 MVR....................................................................................................................................................... 20-8

Table 20-5 MVR Group Configuration ...................................................................................................................20-10

Table 21-1 Static Routing......................................................................................................................................... 21-1

Table 21-2 Static Routing: Summary Table ............................................................................................................. 21-2

Table 22-1 DHCP Relay .......................................................................................................................................... 22-2

Table 23-1 Filename Conventions........................................................................................................................... 23-4

Table 23-2 General Commands for GUI-based FTP Clients ................................................................................... 23-5

Table 24-1 Access Control Overview....................................................................................................................... 24-1

Table 24-2 SNMP Commands ................................................................................................................................. 24-3

Table 24-3 SNMP Traps........................................................................................................................................... 24-3

Table 24-4 Access Control: SNMP .......................................................................................................................... 24-4

Table 24-5 Access Control: Logins .......................................................................................................................... 24-5

Table 24-6 Access Control: Service Access Control.............................................................................................. 24-11

Table 24-7 Access Control: Remote Management................................................................................................24-12

Table 25-1 Diagnostic .............................................................................................................................................. 25-1

Table 26-1 Syslog Severity Levels .......................................................................................................................... 26-1

Table 26-2 Syslog Setup.......................................................................................................................................... 26-2

Table 26-3 Syslog Server Setup.............................................................................................................................. 26-3