ZyXEL Communications ES-3124PWR User Manual
Page 16

Dimension ES-3124PWR Ethernet Switch
xvi
Lists of Figures and Charts
Figure 7-7 VID1 Example Screen............................................................................................................................................... 7-9
Figure 7-8 Port Based VLAN Setup (All Connected)............................................................................................................... 7-11
Figure 7-9 Port Based VLAN Setup (Port isolation)................................................................................................................. 7-12
Figure 8-1 Static MAC Forwarding ............................................................................................................................................ 8-1
Figure 8-2 Static MAC Forwarding: Summary Table ................................................................................................................. 8-2
Figure 9-1 Filtering ..................................................................................................................................................................... 9-1
Figure 9-2 Filtering: Summary Table.......................................................................................................................................... 9-2
Figure 10-1 Spanning Tree Protocol: Status.............................................................................................................................. 10-3
Figure 10-2 Spanning Tree Protocol: Configuring.................................................................................................................... 10-5
Figure 11-1 Bandwidth Control ................................................................................................................................................ 11-1
Figure 12-1 Broadcast Storm Control ....................................................................................................................................... 12-2
Figure 13-1 Mirroring ............................................................................................................................................................... 13-2
Figure 14-1 Aggregation ID...................................................................................................................................................... 14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status ........................................................................................... 14-2
Figure 14-3 Link Aggregation: Configuration .......................................................................................................................... 14-4
Figure 15-1 RADIUS Server..................................................................................................................................................... 15-1
Figure 15-2 Port Authentication................................................................................................................................................ 15-2
Figure 15-3 Port Authentication: RADIUS............................................................................................................................... 15-2
Figure 15-4 Port Authentication: 802.1x................................................................................................................................... 15-3
Figure 16-1 Port Security.......................................................................................................................................................... 16-2
Figure 17-1 Access Control....................................................................................................................................................... 17-1
Figure 17-2 Console Port Priority ............................................................................................................................................. 17-1
Figure 17-3 SNMP Management Model ................................................................................................................................... 17-2
Figure 17-4 Access Control: SNMP.......................................................................................................................................... 17-4
Figure 17-5 Access Control: Logins.......................................................................................................................................... 17-5
Figure 17-6 SSH Communication Example.............................................................................................................................. 17-6
Figure 17-7How SSH Works..................................................................................................................................................... 17-6
Figure 17-8 HTTPS Implementation......................................................................................................................................... 17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ...................................................................................................... 17-8
Figure 17-10 Security Certificate 1 (Netscape)......................................................................................................................... 17-9
Figure 17-11 Security Certificate 2 (Netscape)......................................................................................................................... 17-9
Figure 17-12 Main Screen (Internet Explorer)........................................................................................................................ 17-10
Figure 17-13 Main Screen (Netscape) .................................................................................................................................... 17-10
Figure 17-14 Access Control: Service Access Control............................................................................................................ 17-11
Figure 17-15 Access Control: Remote Management .............................................................................................................. 17-12
Figure 18-1 Queuing Method.................................................................................................................................................... 18-2
Figure 19-1 Classifier................................................................................................................................................................ 19-2
Figure 19-2 Classifier: Summary Table .................................................................................................................................... 19-4
Figure 19-3 Classifier: Example ............................................................................................................................................... 19-6
Figure 20-1 Policy..................................................................................................................................................................... 20-2
Figure 20-2 Policy: Summary Table ......................................................................................................................................... 20-4
Figure 20-3 Policy Example...................................................................................................................................................... 20-6
Figure 21-1 VLAN Stacking Example...................................................................................................................................... 21-2
Figure 21-2 VLAN Stacking ..................................................................................................................................................... 21-4
Figure 22-1 DHCP Relay .......................................................................................................................................................... 22-2