ZyXEL Communications ZyXEL Dimension ES-2048 User Manual
Page 24

List of Figures
ES-2048 User’s Guide
24
Figure 125 Management > Maintenance > Restore Configuration ...................................................... 220
Figure 126 Management > Maintenance > Backup Configuration ...................................................... 220
Figure 127 Management > Access Control ......................................................................................... 223
Figure 128 SNMP Management Model .............................................................................................. 224
Figure 129 Management > Access Control > SNMP ........................................................................... 229
Figure 130 Management > Access Control > SNMP > Trap Group .................................................... 231
Figure 131 Management > Access Control > Logins .......................................................................... 232
Figure 132 SSH Communication Example ........................................................................................... 233
Figure 133 How SSH Works ................................................................................................................. 233
Figure 134 HTTPS Implementation ...................................................................................................... 235
Figure 135 Security Alert Dialog Box (Internet Explorer) ...................................................................... 235
Figure 136 Security Certificate 1 (Netscape) ........................................................................................ 236
Figure 137 Security Certificate 2 (Netscape) ........................................................................................ 236
Figure 138 Example: Lock Denoting a Secure Connection .................................................................. 237
Figure 139 Management > Access Control > Service Access Control ................................................ 237
Figure 140 Management > Access Control > Remote Management .................................................. 238
Figure 141 Management > Diagnostic ................................................................................................. 241
Figure 142 Management > Syslog ....................................................................................................... 244
Figure 143 Management > Syslog > Syslog Server Setup .................................................................. 245
Figure 144 Clustering Application Example ......................................................................................... 248
Figure 145 Management > Cluster Management: Status .................................................................... 248
Figure 146 Cluster Management: Cluster Member Web Configurator Screen .................................... 249
Figure 147 Example: Uploading Firmware to a Cluster Member Switch ............................................. 250
Figure 148 Management > Cluster Management > Configuration ..................................................... 251
Figure 149 MAC Table Flowchart ........................................................................................................ 253
Figure 150 Management > MAC Table ................................................................................................ 254
Figure 151 Management > ARP Table ................................................................................................ 256
Figure 152 Management > Configure Clone ....................................................................................... 257
Figure 153 Console/Dial Backup Port Pin Layout ............................................................................... 270
Figure 154 Network Number and Host ID ............................................................................................ 276
Figure 155 Subnetting Example: Before Subnetting ............................................................................ 278
Figure 156 Subnetting Example: After Subnetting ............................................................................... 279
Figure 157 Conflicting Computer IP Addresses Example .................................................................... 283
Figure 158 Conflicting Computer IP Addresses Example .................................................................... 283
Figure 159 Conflicting Computer and Router IP Addresses Example .................................................. 284