EasyManua.ls Logo

ZyXEL Communications ES-2108 - Page 24

ZyXEL Communications ES-2108
284 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
List of Figures
ES-2108 Series User’s Guide
24
Figure 125 Management > Access Control > Logins .......................................................................... 212
Figure 126 SSH Communication Example ...........................................................................................213
Figure 127 How SSH Works ................................................................................................................. 214
Figure 128 SSH Login Example .......................................................................................................... 215
Figure 129 HTTPS Implementation ...................................................................................................... 216
Figure 130 Security Alert Dialog Box (Internet Explorer) ...................................................................... 217
Figure 131 Security Certificate 1 (Netscape) ........................................................................................ 217
Figure 132 Security Certificate 2 (Netscape) ........................................................................................ 218
Figure 133 Example: Lock Denoting a Secure Connection .................................................................. 218
Figure 134 Management > Access Control > Service Access Control ................................................ 219
Figure 135 Management > Access Control > Remote Management .................................................. 220
Figure 136 Management > Diagnostic ................................................................................................. 221
Figure 137 Management > Syslog ....................................................................................................... 224
Figure 138 Management > Syslog > Server Setup ............................................................................. 225
Figure 139 Clustering Application Example ......................................................................................... 228
Figure 140 Management > Cluster Management: Status .................................................................... 228
Figure 141 Cluster Management: Cluster Member Web Configurator Screen .................................... 229
Figure 142 Example: Uploading Firmware to a Cluster Member Switch ............................................. 230
Figure 143 Management > Cluster Management > Configuration ..................................................... 231
Figure 144 MAC Table Flowchart ........................................................................................................ 233
Figure 145 Management > MAC Table ................................................................................................ 234
Figure 146 Management > ARP Table ................................................................................................ 236
Figure 147 Management > Configure Clone .......................................................................................237
Figure 148 Pop-up Blocker ................................................................................................................... 242
Figure 149 Internet Options ................................................................................................................. 243
Figure 150 Internet Options .................................................................................................................. 244
Figure 151 Pop-up Blocker Settings ..................................................................................................... 244
Figure 152 Internet Options .................................................................................................................. 245
Figure 153 Security Settings - Java Scripting ....................................................................................... 246
Figure 154 Security Settings - Java ...................................................................................................... 246
Figure 155 Java (Sun) .......................................................................................................................... 247
Figure 156 DC Power Plug ................................................................................................................... 249
Figure 157 Masonry Plug and M4 Tap Screw .......................................................................................251
Figure 158 Network Number and Host ID ............................................................................................ 258
Figure 159 Subnetting Example: Before Subnetting ............................................................................ 260
Figure 160 Subnetting Example: After Subnetting ............................................................................... 261
Figure 161 Conflicting Computer IP Addresses Example .................................................................... 265
Figure 162 Conflicting Computer IP Addresses Example .................................................................... 265
Figure 163 Conflicting Computer and Router IP Addresses Example .................................................. 266

Table of Contents

Related product manuals