ES-2048 User’s Guide

Figure 82 SNMP Management Model ..................................................................

178

Figure 83 Access Control: SNMP .........................................................................

180

Figure 84 Access Control: Logins .........................................................................

181

Figure 85 SSH Communication Example ...............................................................

182

Figure 86 How SSH Works ....................................................................................

183

Figure 87 HTTPS Implementation ..........................................................................

184

Figure 88 Security Alert Dialog Box (Internet Explorer) .........................................

185

Figure 89 Security Certificate 1 (Netscape) ...........................................................

186

Figure 90 Security Certificate 2 (Netscape) ...........................................................

186

Figure 91 Example: Lock Denoting a Secure Connection .....................................

187

Figure 92 Access Control: Service Access Control ...............................................

188

Figure 93 Access Control: Remote Management .................................................

189

Figure 94 Diagnostic .............................................................................................

191

Figure 95 Syslog ...................................................................................................

194

Figure 96 Syslog: Server Setup ............................................................................

195

Figure 97 Clustering Application Example ............................................................

198

Figure 98 Clustering Management: Status ............................................................

199

Figure 99 Cluster Management: Cluster Member Web Configurator Screen ........

200

Figure 100 Example: Uploading Firmware to a Cluster Member Switch ...............

201

Figure 101 Clustering Management Configuration ..............................................

202

Figure 102 MAC Table Flowchart ..........................................................................

205

Figure 103 MAC Table ..........................................................................................

206

Figure 104 ARP Table ...........................................................................................

208

Figure 105 Configure Clone ..................................................................................

209

Figure 106 no port-access-authenticator Command Example ..............................

255

Figure 107 Pop-up Blocker ....................................................................................

282

Figure 108 Internet Options ..................................................................................

283

Figure 109 Internet Options ...................................................................................

284

Figure 110 Pop-up Blocker Settings .......................................................................

285

Figure 111 Internet Options ....................................................................................

286

Figure 112 Security Settings - Java Scripting ........................................................

287

Figure 113 Security Settings - Java .......................................................................

288

Figure 114 Java (Sun) ............................................................................................

289

List of Figures

21