beautypg.com

Part v: management, cli, troubleshooting – ZyXEL Communications GS-4012 User Manual

Page 19

background image

Table of Contents

GS-4012F/4024 User’s Guide

19

34.3 VRRP Configuration ....................................................................................................... 269

34.3.1 IP Interface Setup ................................................................................................. 269
34.3.2 VRRP Parameters ................................................................................................. 270
34.3.3 Configuring VRRP Parameters .............................................................................. 271

34.4 VRRP Configuration Summary ........................................................................................ 272
34.5 VRRP Configuration Examples ...................................................................................... 272

34.5.1 One Subnet Network Example .............................................................................. 272
34.5.2 Two Subnets Example .......................................................................................... 274

Part V: Management, CLI, Troubleshooting...................................... 277

Chapter 35
Maintenance .......................................................................................................................... 279

35.1 The Maintenance Screen .............................................................................................. 279
35.2 Load Factory Default ...................................................................................................... 280
35.3 Save Configuration .......................................................................................................... 280
35.4 Reboot System ................................................................................................................ 281
35.5 Firmware Upgrade ........................................................................................................ 281
35.6 Restore a Configuration File ......................................................................................... 282
35.7 Backup a Configuration File ......................................................................................... 282
35.8 FTP Command Line ........................................................................................................ 283

35.8.1 Filename Conventions .......................................................................................... 283
35.8.2 FTP Command Line Procedure ............................................................................ 283
35.8.3 GUI-based FTP Clients .......................................................................................... 284
35.8.4 FTP Restrictions .................................................................................................... 284

Chapter 36
Access Control...................................................................................................................... 285

36.1 Access Control Overview ............................................................................................ 285
36.2 The Access Control Main Screen .................................................................................... 285
36.3 About SNMP .................................................................................................................. 286

36.3.1 SNMP v3 and Security ........................................................................................... 287
36.3.2 Supported MIBs ................................................................................................... 287
36.3.3 SNMP Traps .......................................................................................................... 287
36.3.4 Configuring SNMP ................................................................................................ 291
36.3.5 Configuring SNMP Trap Group ........................................................................... 293
36.3.6 Setting Up Login Accounts ................................................................................. 294

36.4 SSH Overview ................................................................................................................. 296
36.5 How SSH works ............................................................................................................... 296
36.6 SSH Implementation on the Switch ................................................................................. 297

36.6.1 Requirements for Using SSH ................................................................................. 297