ES-3124 User’s Guide
Access Control.....................................................................................................
199
27.1
Access Control Overview ...........................................................................
27.2
The Access Control Main Screen ...................................................................
27.3 About SNMP ................................................................................................
200
27.3.1 Supported MIBs ..................................................................................
201
27.3.2 SNMP Traps .......................................................................................
27.3.3 Configuring SNMP ...............................................................................
202
27.3.4 Setting Up Login Accounts ................................................................
27.4
SSH Overview ................................................................................................
204
27.5 How SSH works .............................................................................................
27.6
SSH Implementation on the Switch ................................................................
205
27.6.1 Requirements for Using SSH ................................................................
206
27.7
Introduction to HTTPS ....................................................................................
27.8 HTTPS Example ............................................................................................
207
27.8.1 Internet Explorer Warning Messages ...................................................
27.8.2 Netscape Navigator Warning Messages ...............................................
27.8.3 The Main Screen ..................................................................................
208
27.9
Service Port Access Control .......................................................................
210
27.10 Remote Management ..............................................................................
211
Chapter 28
.............................................................................................................
213
28.1
Diagnostic .....................................................................................................
Chapter 29
215
29.1
Syslog Overview ............................................................................................
29.2
Syslog Setup .................................................................................................
29.3
Syslog Server Setup .....................................................................................
216
Chapter 30
Cluster Management............................................................................................
219
30.1
Cluster Management Status Overview ..........................................................
30.2
Cluster Management Status ..........................................................................
220
30.2.1 Cluster Member Switch Management ..................................................
221
30.2.1.1 Uploading Firmware to a Cluster Member Switch .....................
222
30.3
Clustering Management Configuration .........................................................
223
Chapter 31
MAC Table.............................................................................................................
227
31.1
MAC Table Overview .....................................................................................
31.2
Viewing the MAC Table .................................................................................
228
Table of Contents
15