ES-2024 Series User’s Guide

Figure 82 HTTPS Implementation ..........................................................................

158

Figure 83 Security Alert Dialog Box (Internet Explorer) ..........................................

159

Figure 84 Security Certificate 1 (Netscape) ............................................................

159

Figure 85 Security Certificate 2 (Netscape) ............................................................

160

Figure 86 Example: Lock Denoting a Secure Connection ......................................

160

Figure 87 Access Control: Service Access Control ...............................................

161

Figure 88 Access Control: Remote Management ..................................................

162

Figure 89 Diagnostic ..............................................................................................

164

Figure 90 Syslog ....................................................................................................

167

Figure 91 Syslog: Server Setup .............................................................................

168

Figure 92 Clustering Application Example .............................................................

170

Figure 93 Cluster Management: Status .................................................................

171

Figure 94 Cluster Management: Cluster Member Web Configurator Screen ........

172

Figure 95 Example: Uploading Firmware to a Cluster Member Switch .................

173

Figure 96 Clustering Management Configuration .................................................

174

Figure 97 MAC Table Flowchart ............................................................................

176

Figure 98 MAC Table .............................................................................................

177

Figure 99 ARP Table .............................................................................................

179

Figure 100 Configure Clone ..................................................................................

180

Figure 101 Pop-up Blocker .....................................................................................

249

Figure 102 Internet Options ...................................................................................

250

Figure 103 Internet Options ....................................................................................

251

Figure 104 Pop-up Blocker Settings .......................................................................

252

Figure 105 Internet Options ....................................................................................

253

Figure 106 Security Settings - Java Scripting .........................................................

254

Figure 107 Security Settings - Java ........................................................................

255

Figure 108 Java (Sun) ............................................................................................

256

List of Figures

22