beautypg.com

ZyXEL Communications ZyXEL Dimension GS-2024 User Manual

Page 17

background image

Table of Contents

GS-2024 User’s Guide

17

24.8.4 FTP Restrictions .................................................................................................... 180

Chapter 25
Access Control...................................................................................................................... 181

25.1 Access Control Overview ............................................................................................ 181
25.2 The Access Control Main Screen .................................................................................... 181
25.3 About SNMP .................................................................................................................. 182

25.3.1 SNMP v3 and Security ........................................................................................... 183
25.3.2 Supported MIBs ................................................................................................... 183
25.3.3 SNMP Traps .......................................................................................................... 183
25.3.4 Configuring SNMP .............................................................................................. 186
25.3.5 Configuring SNMP Trap Group ........................................................................... 188
25.3.6 Setting Up Login Accounts ................................................................................. 189

25.4 SSH Overview ................................................................................................................. 191
25.5 How SSH works ............................................................................................................... 191
25.6 SSH Implementation on the Switch ................................................................................. 192

25.6.1 Requirements for Using SSH ................................................................................. 192

25.7 Introduction to HTTPS ..................................................................................................... 192
25.8 HTTPS Example .............................................................................................................. 193

25.8.1 Internet Explorer Warning Messages ..................................................................... 193
25.8.2 Netscape Navigator Warning Messages ................................................................ 194
25.8.3 The Main Screen .................................................................................................... 194

25.9 Service Port Access Control ......................................................................................... 195
25.10 Remote Management ............................................................................................... 196

Chapter 26
Diagnostic.............................................................................................................................. 199

26.1 Diagnostic ....................................................................................................................... 199

Chapter 27
Syslog .................................................................................................................................... 201

27.1 Syslog Overview .............................................................................................................. 201
27.2 Syslog Setup .................................................................................................................. 201
27.3 Syslog Server Setup ....................................................................................................... 202

Chapter 28
Cluster Management.............................................................................................................205

28.1 Clustering Management Status Overview ...................................................................... 205
28.2 Cluster Management Status ........................................................................................... 206

28.2.1 Cluster Member Switch Management ................................................................... 207

28.3 Clustering Management Configuration .......................................................................... 208

Chapter 29
MAC Table.............................................................................................................................. 211