A SERVICE OF

logo

ES-3124 User’s Guide
Table of Contents 15
Chapter 27
Access Control..................................................................................................... 199
27.1 Access Control Overview ...........................................................................199
27.2 The Access Control Main Screen ...................................................................199
27.3 About SNMP ................................................................................................200
27.3.1 Supported MIBs ..................................................................................201
27.3.2 SNMP Traps .......................................................................................201
27.3.3 Configuring SNMP ...............................................................................202
27.3.4 Setting Up Login Accounts ................................................................202
27.4 SSH Overview ................................................................................................204
27.5 How SSH works .............................................................................................204
27.6 SSH Implementation on the Switch ................................................................205
27.6.1 Requirements for Using SSH ................................................................206
27.7 Introduction to HTTPS ....................................................................................206
27.8 HTTPS Example ............................................................................................207
27.8.1 Internet Explorer Warning Messages ...................................................207
27.8.2 Netscape Navigator Warning Messages ...............................................207
27.8.3 The Main Screen ..................................................................................208
27.9 Service Port Access Control .......................................................................210
27.10 Remote Management ..............................................................................211
Chapter 28
Diagnostic............................................................................................................. 213
28.1 Diagnostic .....................................................................................................213
Chapter 29
Syslog ................................................................................................................... 215
29.1 Syslog Overview ............................................................................................215
29.2 Syslog Setup .................................................................................................215
29.3 Syslog Server Setup .....................................................................................216
Chapter 30
Cluster Management............................................................................................ 219
30.1 Cluster Management Status Overview ..........................................................219
30.2 Cluster Management Status ..........................................................................220
30.2.1 Cluster Member Switch Management ..................................................221
30.2.1.1 Uploading Firmware to a Cluster Member Switch .....................222
30.3 Clustering Management Configuration .........................................................223
Chapter 31
MAC Table............................................................................................................. 227
31.1 MAC Table Overview .....................................................................................227
31.2 Viewing the MAC Table .................................................................................228