ES-3124 User’s Guide
Figure 82 DiffServ .................................................................................................
188
Figure 83 DiffServ .................................................................................................
190
Figure 84 Maintenance ........................................................................................
191
Figure 85 Load Factory Default: Start ...................................................................
192
Figure 86 Reboot System: Confirmation ...............................................................
193
Figure 87 Firmware Upgrade ...............................................................................
194
Figure 88 Restore Configuration ...........................................................................
Figure 89 Backup Configuration ............................................................................
195
Figure 90 Access Control ......................................................................................
199
Figure 91 SNMP Management Model ..................................................................
200
Figure 92 Access Control: SNMP .........................................................................
202
Figure 93 Access Control: Logins .........................................................................
203
Figure 94 SSH Communication Example ...............................................................
204
Figure 95 How SSH Works ....................................................................................
205
Figure 96 HTTPS Implementation ..........................................................................
206
Figure 97 Security Alert Dialog Box (Internet Explorer) .........................................
207
Figure 98 Security Certificate 1 (Netscape) ...........................................................
208
Figure 99 Security Certificate 2 (Netscape) ...........................................................
Figure 100 Login Screen (Internet Explorer) ..........................................................
209
Figure 101 Login Screen (Netscape) .....................................................................
210
Figure 102 Access Control: Service Access Control .............................................
211
Figure 103 Access Control: Remote Management ...............................................
212
Figure 104 Diagnostic ...........................................................................................
213
Figure 105 Syslog .................................................................................................
216
Figure 106 Syslog: Server Setup ..........................................................................
217
Figure 107 Clustering Application Example ..........................................................
220
Figure 108 Cluster Management: Status ...............................................................
221
Figure 109 Cluster Management: Cluster Member Web Configurator Screen ......
222
Figure 110 Example: Uploading Firmware to a Cluster Member Switch ...............
223
Figure 111 Clustering Management Configuration ...............................................
224
Figure 112 MAC Table Flowchart ..........................................................................
227
Figure 113 MAC Table ...........................................................................................
228
Figure 114 ARP Table ...........................................................................................
230
Figure 115 Configure Clone ..................................................................................
231
Figure 116 no port-access-authenticator Command Example ..............................
281
Figure 117 Pop-up Blocker .....................................................................................
308
Figure 118 Internet Options ...................................................................................
309
Figure 119 Internet Options ....................................................................................
310
Figure 120 Pop-up Blocker Settings ......................................................................
311
Figure 121 Internet Options ...................................................................................
312
Figure 122 Security Settings - Java Scripting ........................................................
313
Figure 123 Security Settings - Java .......................................................................
314
Figure 124 Java (Sun) ............................................................................................
315
List of Figures
23