List of Figures

Figure 168 Management > Maintenance ............................................................................................

283

Figure 169 Load Factory Default: Start ................................................................................................

284

Figure 170 Reboot System: Confirmation ...........................................................................................

285

Figure 171 Management > Maintenance > Firmware Upgrade ..........................................................

285

Figure 172 Management > Maintenance > Restore Configuration ......................................................

286

Figure 173 Management > Maintenance > Backup Configuration ......................................................

286

Figure 174 Management > Access Control .........................................................................................

289

Figure 175 SNMP Management Model ..............................................................................................

290

Figure 176 Management > Access Control > SNMP ...........................................................................

295

Figure 177 Management > Access Control > SNMP > Trap Group ....................................................

297

Figure 178 Management > Access Control > Logins ..........................................................................

298

Figure 179 SSH Communication Example ...........................................................................................

299

Figure 180 How SSH Works .................................................................................................................

299

Figure 181 HTTPS Implementation ......................................................................................................

301

Figure 182 Security Alert Dialog Box (Internet Explorer) ......................................................................

301

Figure 183 Security Certificate 1 (Netscape) ........................................................................................

302

Figure 184 Security Certificate 2 (Netscape) ........................................................................................

302

Figure 185 Example: Lock Denoting a Secure Connection ..................................................................

303

Figure 186 Management > Access Control > Service Access Control ................................................

303

Figure 187 Management > Access Control > Remote Management ..................................................

304

Figure 188 Management > Diagnostic .................................................................................................

307

Figure 189 Management > Syslog .......................................................................................................

310

Figure 190 Management > Syslog > Server Setup ..............................................................................

311

Figure 191 Clustering Application Example .........................................................................................

314

Figure 192 Management > Cluster Management ................................................................................

314

Figure 193 Cluster Management: Cluster Member Web Configurator Screen ....................................

315

Figure 194 Example: Uploading Firmware to a Cluster Member Switch .............................................

316

Figure 195 Management > Clustering Management > Configuration .................................................

317

Figure 196 MAC Table Flowchart ........................................................................................................

319

Figure 197 Management > MAC Table ................................................................................................

320

Figure 198 IP Table Flowchart .............................................................................................................

321

Figure 199 Management > IP Table ....................................................................................................

322

Figure 200 Management > ARP Table ................................................................................................

324

Figure 201 Management > Routing Table ..........................................................................................

325

Figure 202 Management > Configure Clone .......................................................................................

327

Figure 203 no port-access-authenticator Command Example ............................................................

396

Figure 204 Pop-up Blocker ...................................................................................................................

426

Figure 205 Internet Options .................................................................................................................

427

Figure 206 Internet Options ..................................................................................................................

428

Figure 207 Pop-up Blocker Settings .....................................................................................................

428

Figure 208 Internet Options ..................................................................................................................

429

Figure 209 Security Settings - Java Scripting .......................................................................................

430

Figure 210 Security Settings - Java ......................................................................................................

430

ES-4124 User’s Guide

29