beautypg.com

ZyXEL Communications GS-3012F/3012 User Manual

Page 18

background image

Table of Contents

GS-3012/GS-3012F User’s Guide

18

28.6 Restore a Configuration File ......................................................................................... 230
28.7 Backup a Configuration File ......................................................................................... 230
28.8 FTP Command Line ........................................................................................................ 231

28.8.1 Filename Conventions .......................................................................................... 231
28.8.2 FTP Command Line Procedure ............................................................................ 231
28.8.3 GUI-based FTP Clients .......................................................................................... 232
28.8.4 FTP Restrictions .................................................................................................... 232

Chapter 29
Access Control...................................................................................................................... 233

29.1 Access Control Overview ............................................................................................ 233
29.2 The Access Control Main Screen .................................................................................... 233
29.3 About SNMP .................................................................................................................. 234

29.3.1 SNMP v3 and Security ........................................................................................... 235
29.3.2 Supported MIBs ................................................................................................... 235
29.3.3 SNMP Traps .......................................................................................................... 235
29.3.4 Configuring SNMP ................................................................................................ 239
29.3.5 Configuring SNMP Trap Group ........................................................................... 241
29.3.6 Setting Up Login Accounts ................................................................................. 242

29.4 SSH Overview ................................................................................................................. 244
29.5 How SSH works ............................................................................................................... 244
29.6 SSH Implementation on the Switch ................................................................................. 245

29.6.1 Requirements for Using SSH ................................................................................. 245

29.7 Introduction to HTTPS ..................................................................................................... 245
29.8 HTTPS Example .............................................................................................................. 246

29.8.1 Internet Explorer Warning Messages ..................................................................... 246
29.8.2 Netscape Navigator Warning Messages ................................................................ 247
29.8.3 The Main Screen .................................................................................................... 247

29.9 Service Port Access Control ......................................................................................... 248
29.10 Remote Management ............................................................................................... 249

Chapter 30
Diagnostic.............................................................................................................................. 251

30.1 Diagnostic ....................................................................................................................... 251

Chapter 31
Syslog .................................................................................................................................... 253

31.1 Syslog Overview .............................................................................................................. 253
31.2 Syslog Setup .................................................................................................................. 253
31.3 Syslog Server Setup ....................................................................................................... 254

Chapter 32
Cluster Management.............................................................................................................257