ES-2048 User’s Guide
Figure 82 SNMP Management Model ..................................................................
178
Figure 83 Access Control: SNMP .........................................................................
180
Figure 84 Access Control: Logins .........................................................................
181
Figure 85 SSH Communication Example ...............................................................
182
Figure 86 How SSH Works ....................................................................................
183
Figure 87 HTTPS Implementation ..........................................................................
184
Figure 88 Security Alert Dialog Box (Internet Explorer) .........................................
185
Figure 89 Security Certificate 1 (Netscape) ...........................................................
186
Figure 90 Security Certificate 2 (Netscape) ...........................................................
Figure 91 Example: Lock Denoting a Secure Connection .....................................
187
Figure 92 Access Control: Service Access Control ...............................................
188
Figure 93 Access Control: Remote Management .................................................
189
Figure 94 Diagnostic .............................................................................................
191
Figure 95 Syslog ...................................................................................................
194
Figure 96 Syslog: Server Setup ............................................................................
195
Figure 97 Clustering Application Example ............................................................
198
Figure 98 Clustering Management: Status ............................................................
199
Figure 99 Cluster Management: Cluster Member Web Configurator Screen ........
200
Figure 100 Example: Uploading Firmware to a Cluster Member Switch ...............
201
Figure 101 Clustering Management Configuration ..............................................
202
Figure 102 MAC Table Flowchart ..........................................................................
205
Figure 103 MAC Table ..........................................................................................
206
Figure 104 ARP Table ...........................................................................................
208
Figure 105 Configure Clone ..................................................................................
209
Figure 106 no port-access-authenticator Command Example ..............................
255
Figure 107 Pop-up Blocker ....................................................................................
282
Figure 108 Internet Options ..................................................................................
283
Figure 109 Internet Options ...................................................................................
284
Figure 110 Pop-up Blocker Settings .......................................................................
285
Figure 111 Internet Options ....................................................................................
286
Figure 112 Security Settings - Java Scripting ........................................................
287
Figure 113 Security Settings - Java .......................................................................
288
Figure 114 Java (Sun) ............................................................................................
289
List of Figures
21