beautypg.com

ZyXEL Communications ZyXEL Dimension GS-2024 User Manual

Page 21

background image

List of Figures

GS-2024 User’s Guide

21

Figure 82 Advanced Application > Loop Guard .................................................................................... 155
Figure 83 Static Routing Overview ...................................................................................................... 159
Figure 84 IP Application > Static Routing ............................................................................................ 160
Figure 85 DiffServ: Differentiated Service Field .................................................................................... 163
Figure 86 DiffServ Network ................................................................................................................. 164
Figure 87 IP Application > DiffServ ...................................................................................................... 165
Figure 88 IP Application > DHCP Status ............................................................................................. 168
Figure 89 IP Application > DHCP > Global .......................................................................................... 169
Figure 90 Global DHCP Relay Network Example ............................................................................... 170
Figure 91 DHCP Relay Configuration Example ................................................................................... 170
Figure 92 IP Application > DHCP > VLAN ......................................................................................... 171
Figure 93 DHCP Relay for Two VLANs ............................................................................................... 172
Figure 94 DHCP Relay for Two VLANs Configuration Example .......................................................... 172
Figure 95 Management > Maintenance ............................................................................................... 175
Figure 96 Load Factory Default: Start .................................................................................................. 176
Figure 97 Reboot System: Confirmation ............................................................................................. 177
Figure 98 Management > Maintenance > Firmware Upgrade ............................................................. 177
Figure 99 Management > Maintenance > Restore Configuration ........................................................ 178
Figure 100 Management > Maintenance > Backup Configuration ...................................................... 178
Figure 101 Management > Access Control ......................................................................................... 181
Figure 102 SNMP Management Model .............................................................................................. 182
Figure 103 Management > Access Control > SNMP ........................................................................... 186
Figure 104 Management > Access Control > SNMP > Trap Group .................................................... 188
Figure 105 Management > Access Control > Logins .......................................................................... 190
Figure 106 SSH Communication Example ........................................................................................... 191
Figure 107 How SSH Works ................................................................................................................. 191
Figure 108 HTTPS Implementation ...................................................................................................... 193
Figure 109 Security Alert Dialog Box (Internet Explorer) ...................................................................... 193
Figure 110 Security Certificate 1 (Netscape) ........................................................................................ 194
Figure 111 Security Certificate 2 (Netscape) ........................................................................................ 194
Figure 112 Example: Lock Denoting a Secure Connection .................................................................. 195
Figure 113 Management > Access Control > Service Access Control ................................................. 195
Figure 114 Management > Access Control > Remote Management ................................................... 196
Figure 115 Management > Diagnostic ................................................................................................. 199
Figure 116 Management > Syslog ....................................................................................................... 202
Figure 117 Management > Syslog > Server Setup .............................................................................. 203
Figure 118 Clustering Application Example ......................................................................................... 206
Figure 119 Management > Cluster Management ................................................................................ 206
Figure 120 Cluster Management: Cluster Member Web Configurator Screen .................................... 207
Figure 121 Example: Uploading Firmware to a Cluster Member Switch ............................................. 208
Figure 122 Management > Clustering Management > Configuration .................................................. 209
Figure 123 MAC Table Flowchart ........................................................................................................ 212
Figure 124 Management > MAC Table ................................................................................................ 212