ES-3124 User’s Guide

Chapter 27

 

 

Access Control.....................................................................................................

199

27.1

Access Control Overview ...........................................................................

199

27.2

The Access Control Main Screen ...................................................................

199

27.3 About SNMP ................................................................................................

200

27.3.1 Supported MIBs ..................................................................................

201

27.3.2 SNMP Traps .......................................................................................

201

27.3.3 Configuring SNMP ...............................................................................

202

27.3.4 Setting Up Login Accounts ................................................................

202

27.4

SSH Overview ................................................................................................

204

27.5 How SSH works .............................................................................................

204

27.6

SSH Implementation on the Switch ................................................................

205

27.6.1 Requirements for Using SSH ................................................................

206

27.7

Introduction to HTTPS ....................................................................................

206

27.8 HTTPS Example ............................................................................................

207

27.8.1 Internet Explorer Warning Messages ...................................................

207

27.8.2 Netscape Navigator Warning Messages ...............................................

207

27.8.3 The Main Screen ..................................................................................

208

27.9

Service Port Access Control .......................................................................

210

27.10 Remote Management ..............................................................................

211

Chapter 28

 

 

Diagnostic

.............................................................................................................

213

28.1

Diagnostic .....................................................................................................

213

Chapter 29

 

 

Syslog ...................................................................................................................

215

29.1

Syslog Overview ............................................................................................

215

29.2

Syslog Setup .................................................................................................

215

29.3

Syslog Server Setup .....................................................................................

216

Chapter 30

 

 

Cluster Management............................................................................................

219

30.1

Cluster Management Status Overview ..........................................................

219

30.2

Cluster Management Status ..........................................................................

220

30.2.1 Cluster Member Switch Management ..................................................

221

 

30.2.1.1 Uploading Firmware to a Cluster Member Switch .....................

222

30.3

Clustering Management Configuration .........................................................

223

Chapter 31

 

 

MAC Table.............................................................................................................

227

31.1

MAC Table Overview .....................................................................................

227

31.2

Viewing the MAC Table .................................................................................

228

Table of Contents

15