beautypg.com

ZyXEL Communications ES-3148 Series User Manual

Page 18

background image

Table of Contents

ES-3148 User’s Guide

18

29.2 Load Factory Default ...................................................................................................... 240
29.3 Save Configuration .......................................................................................................... 240
29.4 Reboot System ................................................................................................................ 241
29.5 Firmware Upgrade ........................................................................................................ 241
29.6 Restore a Configuration File ......................................................................................... 242
29.7 Backup a Configuration File ......................................................................................... 242
29.8 FTP Command Line ........................................................................................................ 243

29.8.1 Filename Conventions .......................................................................................... 243
29.8.2 FTP Command Line Procedure ............................................................................ 243
29.8.3 GUI-based FTP Clients .......................................................................................... 244
29.8.4 FTP Restrictions .................................................................................................... 244

Chapter 30
Access Control...................................................................................................................... 245

30.1 Access Control Overview ............................................................................................ 245
30.2 The Access Control Main Screen .................................................................................... 245
30.3 About SNMP .................................................................................................................. 246

30.3.1 SNMP v3 and Security ........................................................................................... 247
30.3.2 Supported MIBs ................................................................................................... 247
30.3.3 SNMP Traps .......................................................................................................... 247
30.3.4 Configuring SNMP .............................................................................................. 250
30.3.5 Configuring SNMP Trap Group ........................................................................... 252
30.3.6 Setting Up Login Accounts ................................................................................. 253

30.4 SSH Overview ................................................................................................................. 255
30.5 How SSH works ............................................................................................................... 255
30.6 SSH Implementation on the Switch ................................................................................. 256

30.6.1 Requirements for Using SSH ................................................................................. 256

30.7 Introduction to HTTPS ..................................................................................................... 256
30.8 HTTPS Example .............................................................................................................. 257

30.8.1 Internet Explorer Warning Messages ..................................................................... 257
30.8.2 Netscape Navigator Warning Messages ................................................................ 258
30.8.3 The Main Screen .................................................................................................... 258

30.9 Service Port Access Control ......................................................................................... 259
30.10 Remote Management ............................................................................................... 260

Chapter 31
Diagnostic.............................................................................................................................. 263

31.1 Diagnostic ....................................................................................................................... 263

Chapter 32
Syslog .................................................................................................................................... 265

32.1 Syslog Overview .............................................................................................................. 265
32.2 Syslog Setup .................................................................................................................. 265