EasyManua.ls Logo

ZyXEL Communications MGS3520 Series - Page 15

ZyXEL Communications MGS3520 Series
431 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
MGS3520 Series User’s Guide
15
41.3 Save Configuration ........................................................................................................................340
41.4 Reboot System ..............................................................................................................................340
41.5 Firmware Upgrade .....................................................................................................................342
41.6 Restore a Configuration File ......................................................................................................343
41.7 Backup a Configuration File .......................................................................................................343
41.8 Tech-Support ................................................................................................................................344
41.9 FTP Command Line ......................................................................................................................345
41.9.1 Filename Conventions ........................................................................................................346
41.9.2 FTP Command Line Procedure ..........................................................................................346
41.9.3 GUI-based FTP Clients ........................................................................................................347
41.9.4 FTP Restrictions .................................................................................................................347
Chapter 42
Access Control .................................................................................................................................348
42.1 Access Control Overview ..........................................................................................................348
42.2 The Access Control Main Screen ..................................................................................................348
42.3 About SNMP ...............................................................................................................................348
42.3.1 SNMP v3 and Security ........................................................................................................349
42.3.2 Supported MIBs ..................................................................................................................350
42.3.3 SNMP Traps ........................................................................................................................350
42.3.4 Configuring SNMP ..............................................................................................................355
42.3.5 Configuring SNMP Trap Group .........................................................................................357
42.3.6 Enabling/Disabling Sending of SNMP Traps on a Port ......................................................358
42.3.7 Configuring SNMP User ...................................................................................................359
42.4 Setting Up Login Accounts ........................................................................................................361
42.5 SSH Overview ...............................................................................................................................362
42.6 How SSH works ............................................................................................................................363
42.7 SSH Implementation on the Switch ...............................................................................................364
42.7.1 Requirements for Using SSH ...............................................................................................364
42.8 Introduction to HTTPS ...................................................................................................................364
42.9 HTTPS Example ...........................................................................................................................365
42.9.1 Internet Explorer Warning Messages ..................................................................................365
42.9.2 Mozilla Firefox Warning Messages ......................................................................................367
42.9.3 The Main Screen .................................................................................................................368
42.10 Service Port Access Control ....................................................................................................369
42.11 Remote Management .............................................................................................................370
Chapter 43
Diagnostic .........................................................................................................................................372
43.1 Diagnostic ....................................................................................................................................372
Chapter 44
Syslog................................................................................................................................................374

Table of Contents

Related product manuals