EasyManua.ls Logo

ZyXEL Communications MGS-3712F - Page 19

ZyXEL Communications MGS-3712F
382 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
MGS-3712/MGS-3712F User’s Guide
19
33.7 Backup a Configuration File ......................................................................................... 301
33.8 FTP Command Line ........................................................................................................ 301
33.8.1 Filename Conventions .......................................................................................... 301
33.8.2 FTP Command Line Procedure ............................................................................ 302
33.8.3 GUI-based FTP Clients .......................................................................................... 303
33.8.4 FTP Restrictions .................................................................................................... 303
Chapter 34
Access Control......................................................................................................................305
34.1 Access Control Overview ............................................................................................ 305
34.2 The Access Control Main Screen .................................................................................... 305
34.3 About SNMP .................................................................................................................. 306
34.3.1 SNMP v3 and Security ........................................................................................... 307
34.3.2 Supported MIBs .................................................................................................... 307
34.3.3 SNMP Traps .......................................................................................................... 308
34.3.4 Configuring SNMP ................................................................................................ 315
34.3.5 Configuring SNMP Trap Group ........................................................................... 318
34.3.6 Setting Up Login Accounts ................................................................................. 319
34.4 SSH Overview ................................................................................................................. 320
34.5 How SSH works ............................................................................................................... 321
34.6 SSH Implementation on the Switch ................................................................................. 322
34.6.1 Requirements for Using SSH ................................................................................. 322
34.7 Introduction to HTTPS .....................................................................................................322
34.8 HTTPS Example .............................................................................................................. 323
34.8.1 Internet Explorer Warning Messages ..................................................................... 323
34.8.2 Netscape Navigator Warning Messages ................................................................ 324
34.8.3 The Main Screen .................................................................................................... 326
34.9 Service Port Access Control ......................................................................................... 326
34.10 Remote Management ............................................................................................... 327
Chapter 35
Diagnostic..............................................................................................................................329
35.1 Diagnostic ....................................................................................................................... 329
Chapter 36
Syslog....................................................................................................................................331
36.1 Syslog Overview .............................................................................................................. 331
36.2 Syslog Setup .................................................................................................................. 332
36.3 Syslog Server Setup ....................................................................................................... 333
Chapter 37
Cluster Management.............................................................................................................335
37.1 Cluster Management Status Overview ........................................................................... 335

Table of Contents

Related product manuals