GS-3012F User’s Guide
xiv
Lists of Figures
Figure 11-1 Bandwidth Control ................................................................................................................................ 11-1
Figure 12-1 Broadcast Storm Control...................................................................................................................... 12-1
Figure 13-1 Mirroring ............................................................................................................................................... 13-1
Figure 14-1 Aggregation ID ..................................................................................................................................... 14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status ............................................................................ 14-2
Figure 14-3 Link Aggregation: Configuration........................................................................................................... 14-4
Figure 15-1 RADIUS Server .................................................................................................................................... 15-1
Figure 15-2 Port Authentication............................................................................................................................... 15-1
Figure 15-3 Port Authentication: RADIUS ............................................................................................................... 15-2
Figure 15-4 Port Authentication: 802.1x .................................................................................................................. 15-3
Figure 16-1 Port Security......................................................................................................................................... 16-1
Figure 17-1 Access Control ..................................................................................................................................... 17-1
Figure 17-2 Console Port Priority ............................................................................................................................ 17-1
Figure 17-3 SNMP Management Model.................................................................................................................. 17-2
Figure 17-4 Access Control: SNMP......................................................................................................................... 17-4
Figure 17-5 Access Control: Logins ........................................................................................................................ 17-5
Figure 17-6 SSH Communication Example............................................................................................................. 17-6
Figure 17-7How SSH Works ................................................................................................................................... 17-6
Figure 17-8 HTTPS Implementation........................................................................................................................ 17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ....................................................................................... 17-8
Figure 17-10 Security Certificate 1 (Netscape) ....................................................................................................... 17-9
Figure 17-11 Security Certificate 2 (Netscape) ....................................................................................................... 17-9
Figure 17-12 Main Screen (Internet Explorer).......................................................................................................17-10
Figure 17-13 Main Screen (Netscape) ..................................................................................................................17-10
Figure 17-14 Access Control: Service Access Control.......................................................................................... 17-11
Figure 17-15 Access Control: Remote Management ............................................................................................ 17-11
Figure 18-1 Queuing Method................................................................................................................................... 18-2
Figure 19-1 Classifier .............................................................................................................................................. 19-2
Figure 19-2 Classifier: Summary Table ................................................................................................................... 19-4
Figure 19-3 Classifier: Example .............................................................................................................................. 19-6
Figure 20-1 Policy.................................................................................................................................................... 20-2
Figure 20-2 Policy: Summary Table......................................................................................................................... 20-4
Figure 20-3 Policy Example..................................................................................................................................... 20-6
Figure 21-1 DHCP Relay......................................................................................................................................... 21-2
Figure 22-1 Static Routing ....................................................................................................................................... 22-1
Figure 22-2 Static Routing: Summary Table............................................................................................................ 22-2
Figure 23-1 Maintenance......................................................................................................................................... 23-1
Figure 23-2 Firmware Upgrade ............................................................................................................................... 23-1
Figure 23-3 Restore Configuration .......................................................................................................................... 23-2
Figure 23-4 Backup Configuration........................................................................................................................... 23-2
Figure 23-5 Confirm Load factory Defaults ............................................................................................................. 23-3
Figure 23-6 Restart Switch After Load Factory Defaults ......................................................................................... 23-3
Figure 23-7 Confirm Restart The Switch ................................................................................................................. 23-3
Figure 24-1 Diagnostic ............................................................................................................................................ 24-1
Figure 25-1 Clustering Application Example ........................................................................................................... 25-1
Summary of Contents for Dimension GS-3012F
Page 1: ...Dimension GS 3012F Gigabit Ethernet Switch Version 3 60 LR 0 5 2005 User s Guide...
Page 5: ......
Page 12: ......
Page 22: ......
Page 32: ......
Page 36: ......
Page 44: ......
Page 46: ......
Page 60: ......
Page 74: ......
Page 84: ...GS 3012F User s Guide 7 10 VLAN Figure 7 8 Port Based VLAN Setup All Connected...
Page 92: ......
Page 98: ......
Page 102: ......
Page 112: ......
Page 116: ......
Page 134: ......
Page 140: ...GS 3012F User s Guide 19 6 Classifier Figure 19 3 Classifier Example...
Page 146: ...GS 3012F User s Guide 20 6 Policy Rule Figure 20 3 Policy Example...
Page 150: ......
Page 158: ......
Page 160: ......
Page 172: ......
Page 196: ......
Page 214: ......
Page 224: ......
Page 228: ......
Page 235: ...GS 3012F User s Guide Index B 7 ZyXEL Limited Warranty iii Note iii ZyXEL Web Site xvi...