ES-3124 User’s Guide

Figure 82 DiffServ .................................................................................................

188

Figure 83 DiffServ .................................................................................................

190

Figure 84 Maintenance ........................................................................................

191

Figure 85 Load Factory Default: Start ...................................................................

192

Figure 86 Reboot System: Confirmation ...............................................................

193

Figure 87 Firmware Upgrade ...............................................................................

194

Figure 88 Restore Configuration ...........................................................................

194

Figure 89 Backup Configuration ............................................................................

195

Figure 90 Access Control ......................................................................................

199

Figure 91 SNMP Management Model ..................................................................

200

Figure 92 Access Control: SNMP .........................................................................

202

Figure 93 Access Control: Logins .........................................................................

203

Figure 94 SSH Communication Example ...............................................................

204

Figure 95 How SSH Works ....................................................................................

205

Figure 96 HTTPS Implementation ..........................................................................

206

Figure 97 Security Alert Dialog Box (Internet Explorer) .........................................

207

Figure 98 Security Certificate 1 (Netscape) ...........................................................

208

Figure 99 Security Certificate 2 (Netscape) ...........................................................

208

Figure 100 Login Screen (Internet Explorer) ..........................................................

209

Figure 101 Login Screen (Netscape) .....................................................................

210

Figure 102 Access Control: Service Access Control .............................................

211

Figure 103 Access Control: Remote Management ...............................................

212

Figure 104 Diagnostic ...........................................................................................

213

Figure 105 Syslog .................................................................................................

216

Figure 106 Syslog: Server Setup ..........................................................................

217

Figure 107 Clustering Application Example ..........................................................

220

Figure 108 Cluster Management: Status ...............................................................

221

Figure 109 Cluster Management: Cluster Member Web Configurator Screen ......

222

Figure 110 Example: Uploading Firmware to a Cluster Member Switch ...............

223

Figure 111 Clustering Management Configuration ...............................................

224

Figure 112 MAC Table Flowchart ..........................................................................

227

Figure 113 MAC Table ...........................................................................................

228

Figure 114 ARP Table ...........................................................................................

230

Figure 115 Configure Clone ..................................................................................

231

Figure 116 no port-access-authenticator Command Example ..............................

281

Figure 117 Pop-up Blocker .....................................................................................

308

Figure 118 Internet Options ...................................................................................

309

Figure 119 Internet Options ....................................................................................

310

Figure 120 Pop-up Blocker Settings ......................................................................

311

Figure 121 Internet Options ...................................................................................

312

Figure 122 Security Settings - Java Scripting ........................................................

313

Figure 123 Security Settings - Java .......................................................................

314

Figure 124 Java (Sun) ............................................................................................

315

List of Figures

23