A SERVICE OF

logo

Table of Contents
XGS-4528F User’s Guide
20
35.6 SSH Implementation on the Switch ................................................................................. 296
35.6.1 Requirements for Using SSH ................................................................................. 296
35.7 Introduction to HTTPS .....................................................................................................296
35.8 HTTPS Example .............................................................................................................. 297
35.8.1 Internet Explorer Warning Messages ..................................................................... 297
35.8.2 Netscape Navigator Warning Messages ................................................................ 298
35.8.3 The Main Screen .................................................................................................... 298
35.9 Service Port Access Control ......................................................................................... 299
35.10 Remote Management ............................................................................................... 300
Chapter 36
Diagnostic..............................................................................................................................303
36.1 Diagnostic ........................................................................................................................ 303
Chapter 37
Syslog ....................................................................................................................................305
37.1 Syslog Overview .............................................................................................................. 305
37.2 Syslog Setup ................................................................................................................... 305
37.3 Syslog Server Setup ........................................................................................................ 306
Chapter 38
Cluster Management.............................................................................................................309
38.1 Clustering Management Status Overview ....................................................................... 309
38.2 Cluster Management Status ............................................................................................ 310
38.2.1 Cluster Member Switch Management .....................................................................311
38.3 Clustering Management Configuration .......................................................................... 312
Chapter 39
MAC Table.............................................................................................................................. 315
39.1 MAC Table Overview ....................................................................................................... 315
39.2 Viewing the MAC Table .................................................................................................... 316
Chapter 40
IP Table ..................................................................................................................................317
40.1 IP Table Overview ............................................................................................................ 317
40.2 Viewing the IP Table ........................................................................................................ 318
Chapter 41
ARP Table ..............................................................................................................................319
41.1 ARP Table Overview ........................................................................................................319
41.1.1 How ARP Works .................................................................................................... 319
41.2 Viewing the ARP Table .................................................................................................... 319