beautypg.com

ZyXEL Communications ES-3124PWR User Manual

Page 16

background image

Dimension ES-3124PWR Ethernet Switch

xvi

Lists of Figures and Charts

Figure 7-7 VID1 Example Screen............................................................................................................................................... 7-9

Figure 7-8 Port Based VLAN Setup (All Connected)............................................................................................................... 7-11

Figure 7-9 Port Based VLAN Setup (Port isolation)................................................................................................................. 7-12

Figure 8-1 Static MAC Forwarding ............................................................................................................................................ 8-1

Figure 8-2 Static MAC Forwarding: Summary Table ................................................................................................................. 8-2

Figure 9-1 Filtering ..................................................................................................................................................................... 9-1

Figure 9-2 Filtering: Summary Table.......................................................................................................................................... 9-2

Figure 10-1 Spanning Tree Protocol: Status.............................................................................................................................. 10-3

Figure 10-2 Spanning Tree Protocol: Configuring.................................................................................................................... 10-5

Figure 11-1 Bandwidth Control ................................................................................................................................................ 11-1

Figure 12-1 Broadcast Storm Control ....................................................................................................................................... 12-2

Figure 13-1 Mirroring ............................................................................................................................................................... 13-2

Figure 14-1 Aggregation ID...................................................................................................................................................... 14-2

Figure 14-2 Link Aggregation: Link Aggregation Protocol Status ........................................................................................... 14-2

Figure 14-3 Link Aggregation: Configuration .......................................................................................................................... 14-4

Figure 15-1 RADIUS Server..................................................................................................................................................... 15-1

Figure 15-2 Port Authentication................................................................................................................................................ 15-2

Figure 15-3 Port Authentication: RADIUS............................................................................................................................... 15-2

Figure 15-4 Port Authentication: 802.1x................................................................................................................................... 15-3

Figure 16-1 Port Security.......................................................................................................................................................... 16-2

Figure 17-1 Access Control....................................................................................................................................................... 17-1

Figure 17-2 Console Port Priority ............................................................................................................................................. 17-1

Figure 17-3 SNMP Management Model ................................................................................................................................... 17-2

Figure 17-4 Access Control: SNMP.......................................................................................................................................... 17-4

Figure 17-5 Access Control: Logins.......................................................................................................................................... 17-5

Figure 17-6 SSH Communication Example.............................................................................................................................. 17-6

Figure 17-7How SSH Works..................................................................................................................................................... 17-6

Figure 17-8 HTTPS Implementation......................................................................................................................................... 17-7

Figure 17-9 Security Alert Dialog Box (Internet Explorer) ...................................................................................................... 17-8

Figure 17-10 Security Certificate 1 (Netscape)......................................................................................................................... 17-9

Figure 17-11 Security Certificate 2 (Netscape)......................................................................................................................... 17-9

Figure 17-12 Main Screen (Internet Explorer)........................................................................................................................ 17-10

Figure 17-13 Main Screen (Netscape) .................................................................................................................................... 17-10

Figure 17-14 Access Control: Service Access Control............................................................................................................ 17-11

Figure 17-15 Access Control: Remote Management .............................................................................................................. 17-12

Figure 18-1 Queuing Method.................................................................................................................................................... 18-2

Figure 19-1 Classifier................................................................................................................................................................ 19-2

Figure 19-2 Classifier: Summary Table .................................................................................................................................... 19-4

Figure 19-3 Classifier: Example ............................................................................................................................................... 19-6

Figure 20-1 Policy..................................................................................................................................................................... 20-2

Figure 20-2 Policy: Summary Table ......................................................................................................................................... 20-4

Figure 20-3 Policy Example...................................................................................................................................................... 20-6

Figure 21-1 VLAN Stacking Example...................................................................................................................................... 21-2

Figure 21-2 VLAN Stacking ..................................................................................................................................................... 21-4

Figure 22-1 DHCP Relay .......................................................................................................................................................... 22-2