A SERVICE OF

logo

Table of Contents
MGS-3712/MGS-3712F User’s Guide
19
33.7 Backup a Configuration File ......................................................................................... 301
33.8 FTP Command Line ........................................................................................................ 301
33.8.1 Filename Conventions .......................................................................................... 301
33.8.2 FTP Command Line Procedure ............................................................................ 302
33.8.3 GUI-based FTP Clients .......................................................................................... 303
33.8.4 FTP Restrictions .................................................................................................... 303
Chapter 34
Access Control......................................................................................................................305
34.1 Access Control Overview ............................................................................................ 305
34.2 The Access Control Main Screen .................................................................................... 305
34.3 About SNMP .................................................................................................................. 306
34.3.1 SNMP v3 and Security ........................................................................................... 307
34.3.2 Supported MIBs .................................................................................................... 307
34.3.3 SNMP Traps .......................................................................................................... 308
34.3.4 Configuring SNMP ................................................................................................ 315
34.3.5 Configuring SNMP Trap Group ........................................................................... 318
34.3.6 Setting Up Login Accounts ................................................................................. 319
34.4 SSH Overview ................................................................................................................. 320
34.5 How SSH works ............................................................................................................... 321
34.6 SSH Implementation on the Switch ................................................................................. 322
34.6.1 Requirements for Using SSH ................................................................................. 322
34.7 Introduction to HTTPS .....................................................................................................322
34.8 HTTPS Example .............................................................................................................. 323
34.8.1 Internet Explorer Warning Messages ..................................................................... 323
34.8.2 Netscape Navigator Warning Messages ................................................................ 324
34.8.3 The Main Screen .................................................................................................... 326
34.9 Service Port Access Control ......................................................................................... 326
34.10 Remote Management ............................................................................................... 327
Chapter 35
Diagnostic..............................................................................................................................329
35.1 Diagnostic ....................................................................................................................... 329
Chapter 36
Syslog ....................................................................................................................................331
36.1 Syslog Overview .............................................................................................................. 331
36.2 Syslog Setup .................................................................................................................. 332
36.3 Syslog Server Setup ....................................................................................................... 333
Chapter 37
Cluster Management.............................................................................................................335
37.1 Cluster Management Status Overview ........................................................................... 335