A SERVICE OF

logo

ES-2108 Series User’s Guide
List of Figures 23
Figure 82 SNMP Management Model ..................................................................150
Figure 83 Access Control: SNMP .......................................................................... 152
Figure 84 Access Control: Logins .......................................................................... 153
Figure 85 SSH Communication Example ............................................................... 154
Figure 86 How SSH Works ..................................................................................... 154
Figure 87 SSH Login Example ..............................................................................156
Figure 88 HTTPS Implementation .......................................................................... 157
Figure 89 Security Alert Dialog Box (Internet Explorer) .......................................... 158
Figure 90 Security Certificate 1 (Netscape) ............................................................ 158
Figure 91 Security Certificate 2 (Netscape) ............................................................ 159
Figure 92 Example: Lock Denoting a Secure Connection ...................................... 159
Figure 93 Access Control: Service Access Control ............................................... 160
Figure 94 Access Control: Remote Management ..................................................161
Figure 95 Diagnostic .............................................................................................. 163
Figure 96 Syslog .................................................................................................... 166
Figure 97 Syslog: Server Setup ............................................................................. 167
Figure 98 Clustering Application Example ............................................................. 169
Figure 99 Clustering Management: Status ............................................................ 170
Figure 100 Cluster Management: Cluster Member Web Configurator Screen ...... 171
Figure 101 Example: Uploading Firmware to a Cluster Member Switch ...............172
Figure 102 Clustering Management Configuration ...............................................173
Figure 103 MAC Table Flowchart .......................................................................... 175
Figure 104 MAC Table ........................................................................................... 176
Figure 105 ARP Table ........................................................................................... 178
Figure 106 Configure Clone .................................................................................. 179
Figure 107 no port-access-authenticator Command Example ..............................223
Figure 108 Pop-up Blocker .....................................................................................249
Figure 109 Internet Options ................................................................................... 249
Figure 110 Internet Options .................................................................................... 250
Figure 111 Pop-up Blocker Settings ....................................................................... 250
Figure 112 Internet Options .................................................................................... 251
Figure 113 Security Settings - Java Scripting ......................................................... 252
Figure 114 Security Settings - Java ........................................................................252
Figure 115 Java (Sun) ............................................................................................ 253