Zyxel MES-3728 [19/388] Chapter 34 access control 05

Zyxel MES-3728 [19/388] Chapter 34 access control 05
Table of Contents
MES-3728 User’s Guide
19
33.7 Backup a Configuration File ......................................................................................... 301
33.8 FTP Command Line ........................................................................................................ 301
33.8.1 Filename Conventions .......................................................................................... 301
33.8.2 FTP Command Line Procedure ............................................................................ 303
33.8.3 GUI-based FTP Clients .......................................................................................... 303
33.8.4 FTP Restrictions .................................................................................................... 304
Chapter 34
Access Control......................................................................................................................305
34.1 Access Control Overview ............................................................................................ 305
34.2 The Access Control Main Screen .................................................................................... 305
34.3 About SNMP .................................................................................................................. 306
34.3.1 SNMP v3 and Security ........................................................................................... 307
34.3.2 Supported MIBs .................................................................................................... 307
34.3.3 SNMP Traps .......................................................................................................... 308
34.3.4 Configuring SNMP ................................................................................................ 312
34.3.5 Configuring SNMP Trap Group ........................................................................... 314
34.3.6 Setting Up Login Accounts ................................................................................. 315
34.4 SSH Overview ................................................................................................................. 317
34.5 How SSH works ............................................................................................................... 318
34.6 SSH Implementation on the Switch ................................................................................. 319
34.6.1 Requirements for Using SSH ................................................................................. 319
34.7 Introduction to HTTPS .....................................................................................................319
34.8 HTTPS Example .............................................................................................................. 320
34.8.1 Internet Explorer Warning Messages ..................................................................... 320
34.8.2 Netscape Navigator Warning Messages ................................................................ 321
34.8.3 The Main Screen .................................................................................................... 323
34.9 Service Port Access Control ......................................................................................... 323
34.10 Remote Management ............................................................................................... 324
Chapter 35
Diagnostic..............................................................................................................................327
35.1 Diagnostic ....................................................................................................................... 327
Chapter 36
Syslog....................................................................................................................................329
36.1 Syslog Overview .............................................................................................................. 329
36.2 Syslog Setup .................................................................................................................. 330
36.3 Syslog Server Setup .......................................................................................................331
Chapter 37
Cluster Management.............................................................................................................333
37.1 Cluster Management Status Overview ........................................................................... 333

Содержание

Скачать