ZyXEL MI-7248 User Guide - Page 24

List of s, MS-7206 User's Guide

Page 24 highlights

List of Figures Figure 125 Security Certificate 1 (Netscape 236 Figure 126 Security Certificate 2 (Netscape 236 Figure 127 Example: Lock Denoting a Secure Connection 237 Figure 128 Service Access Control ...237 Figure 129 Remote Management ...238 Figure 130 Diagnostic ...241 Figure 131 Syslog Setup ...244 Figure 132 Syslog Server Setup ...245 Figure 133 Clustering Application Example 247 Figure 134 Clustering Management Status 248 Figure 135 Cluster Management: Cluster Member Web Configurator Screen 249 Figure 136 Example: Uploading Firmware to a Cluster Member Switch 250 Figure 137 Clustering Management Configuration 251 Figure 138 MAC Table Flowchart ...253 Figure 139 MAC Table ...254 Figure 140 IP Table Flowchart ...255 Figure 141 IP Table ...256 Figure 142 ARP Table ...258 Figure 143 Routing Table Status ...259 Figure 144 Configure Clone ...261 Figure 145 Console/Dial Backup Port Pin Layout 275 Figure 146 Pop-up Blocker ...287 Figure 147 Internet Options ...288 Figure 148 Internet Options ...289 Figure 149 Pop-up Blocker Settings ...289 Figure 150 Internet Options ...290 Figure 151 Security Settings - Java Scripting 291 Figure 152 Security Settings - Java ...291 Figure 153 Java (Sun) ...292 24 MS-7206 User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310

List of Figures
MS-7206 User’s Guide
24
Figure 125 Security Certificate 1 (Netscape)
........................................................................................
236
Figure 126 Security Certificate 2 (Netscape)
........................................................................................
236
Figure 127 Example: Lock Denoting a Secure Connection
..................................................................
237
Figure 128 Service Access Control
......................................................................................................
237
Figure 129 Remote Management
.........................................................................................................
238
Figure 130 Diagnostic
..........................................................................................................................
241
Figure 131 Syslog Setup
......................................................................................................................
244
Figure 132 Syslog Server Setup
..........................................................................................................
245
Figure 133 Clustering Application Example
.........................................................................................
247
Figure 134 Clustering Management Status
.........................................................................................
248
Figure 135 Cluster Management: Cluster Member Web Configurator Screen
....................................
249
Figure 136 Example: Uploading Firmware to a Cluster Member Switch
.............................................
250
Figure 137 Clustering Management Configuration
..............................................................................
251
Figure 138 MAC Table Flowchart
........................................................................................................
253
Figure 139 MAC Table
..........................................................................................................................
254
Figure 140 IP Table Flowchart
.............................................................................................................
255
Figure 141 IP Table
.............................................................................................................................
256
Figure 142 ARP Table
..........................................................................................................................
258
Figure 143 Routing Table Status
.........................................................................................................
259
Figure 144 Configure Clone
.................................................................................................................
261
Figure 145 Console/Dial Backup Port Pin Layout
................................................................................
275
Figure 146 Pop-up Blocker
...................................................................................................................
287
Figure 147 Internet Options
..................................................................................................................
288
Figure 148 Internet Options
..................................................................................................................
289
Figure 149 Pop-up Blocker Settings
.....................................................................................................
289
Figure 150 Internet Options
..................................................................................................................
290
Figure 151 Security Settings - Java Scripting
.......................................................................................
291
Figure 152 Security Settings - Java
......................................................................................................
291
Figure 153 Java (Sun)
..........................................................................................................................
292