beautypg.com

Part iv: static routing and management – ZyXEL Communications GS-3012F Series User Manual

Page 16

background image

Table of Contents

GS-3012/GS-3012F User’s Guide

16

22.1.1 DHCP “Relay Agent Information Option” ............................................................... 161
22.1.2 DHCP Relay Agent Circuit ID Sub-option Format .................................................. 161

22.2 DHCP Relay Configuration ............................................................................................. 161

Part IV: Static Routing and Management ........................................... 163

Chapter 23
Routing Protocol .................................................................................................................. 165

23.1 Static Route Overview .................................................................................................... 165

Chapter 24
Maintenance .......................................................................................................................... 167

24.1 Maintenance ................................................................................................................... 167
24.2 Firmware Upgrade .......................................................................................................... 168
24.3 Restore a Configuration File ........................................................................................... 169
24.4 Backing Up a Configuration File ..................................................................................... 169
24.5 Load Factory Defaults ..................................................................................................... 170
24.6 Save Configuration .......................................................................................................... 170
24.7 Reboot System ................................................................................................................ 171
24.8 Command Line FTP ........................................................................................................ 171

24.8.1 Filename Conventions ........................................................................................... 171
24.8.2 FTP Command Line Procedure ............................................................................. 172
24.8.3 GUI-based FTP Clients .......................................................................................... 173
24.8.4 FTP Restrictions ..................................................................................................... 173

Chapter 25
Access Control...................................................................................................................... 175

25.1 About Access Control .................................................................................................... 175
25.2 Access Control Overview ................................................................................................ 175
25.3 About SNMP ................................................................................................................... 176

25.3.1 Supported MIBs ..................................................................................................... 177
25.3.2 SNMP Traps ......................................................................................................... 177
25.3.3 Configuring SNMP ................................................................................................. 177
25.3.4 Setting Up Login Accounts ................................................................................... 178

25.4 SSH Overview ................................................................................................................. 180
25.5 How SSH works ............................................................................................................... 180
25.6 SSH Implementation ....................................................................................................... 181

25.6.1 Requirements for Using SSH ................................................................................. 181

25.7 Introduction to HTTPS ..................................................................................................... 181

25.7.1 HTTPS Example .................................................................................................... 182
25.7.2 Internet Explorer Warning Messages ..................................................................... 182