ZyXEL Communications GS-4012F/4024 User Manual
Page 25
GS-4012F/4024 User’s Guide
24
List of Figures
Figure 125 Restore Configuration ......................................................................... 212
Figure 126 Backup Configuration .......................................................................... 212
Figure 127 Access Control .................................................................................... 215
Figure 128 SNMP Management Model ................................................................ 216
Figure 129 Access Control: SNMP ....................................................................... 218
Figure 130 Access Control: Logins ....................................................................... 219
Figure 131 SSH Communication Example ............................................................. 220
Figure 132 How SSH Works .................................................................................. 221
Figure 133 HTTPS Implementation ........................................................................ 222
Figure 134 Security Alert Dialog Box (Internet Explorer) ....................................... 223
Figure 135 Security Certificate 1 (Netscape) ......................................................... 224
Figure 136 Security Certificate 2 (Netscape) ......................................................... 224
Figure 137 Example: Lock Denoting a Secure Connection ................................... 225
Figure 138 Access Control: Service Access Control ............................................. 226
Figure 139 Access Control: Remote Management ............................................... 227
Figure 140 Diagnostic ........................................................................................... 229
Figure 141 Syslog ................................................................................................. 232
Figure 142 Syslog: Server Setup .......................................................................... 233
Figure 143 Clustering Application Example .......................................................... 236
Figure 144 Cluster Management: Status ............................................................... 237
Figure 145 Cluster Management: Cluster Member Web Configurator Screen ...... 238
Figure 146 Example: Uploading Firmware to a Cluster Member Switch ............... 239
Figure 147 Clustering Management Configuration .............................................. 240
Figure 148 MAC Table Flowchart .......................................................................... 243
Figure 149 MAC Table .......................................................................................... 244
Figure 150 IP Table Flowchart .............................................................................. 245
Figure 151 IP Table ............................................................................................... 246
Figure 152 ARP Table ........................................................................................... 248
Figure 153 Routing Table Status ........................................................................... 249
Figure 154 Configure Clone .................................................................................. 251
Figure 155 no port-access-authenticator Command Example .............................. 305
Figure 156 Pop-up Blocker .................................................................................... 332
Figure 157 Internet Options .................................................................................. 333
Figure 158 Internet Options ................................................................................... 334
Figure 159 Pop-up Blocker Settings ...................................................................... 335
Figure 160 Internet Options ................................................................................... 336
Figure 161 Security Settings - Java Scripting ........................................................ 337
Figure 162 Security Settings - Java ....................................................................... 338
Figure 163 Java (Sun) ............................................................................................ 339