List of Figures
Figure 168 Management > Maintenance ............................................................................................
283
Figure 169 Load Factory Default: Start ................................................................................................
284
Figure 170 Reboot System: Confirmation ...........................................................................................
285
Figure 171 Management > Maintenance > Firmware Upgrade ..........................................................
Figure 172 Management > Maintenance > Restore Configuration ......................................................
286
Figure 173 Management > Maintenance > Backup Configuration ......................................................
Figure 174 Management > Access Control .........................................................................................
289
Figure 175 SNMP Management Model ..............................................................................................
290
Figure 176 Management > Access Control > SNMP ...........................................................................
295
Figure 177 Management > Access Control > SNMP > Trap Group ....................................................
297
Figure 178 Management > Access Control > Logins ..........................................................................
298
Figure 179 SSH Communication Example ...........................................................................................
299
Figure 180 How SSH Works .................................................................................................................
Figure 181 HTTPS Implementation ......................................................................................................
301
Figure 182 Security Alert Dialog Box (Internet Explorer) ......................................................................
Figure 183 Security Certificate 1 (Netscape) ........................................................................................
302
Figure 184 Security Certificate 2 (Netscape) ........................................................................................
Figure 185 Example: Lock Denoting a Secure Connection ..................................................................
303
Figure 186 Management > Access Control > Service Access Control ................................................
Figure 187 Management > Access Control > Remote Management ..................................................
304
Figure 188 Management > Diagnostic .................................................................................................
307
Figure 189 Management > Syslog .......................................................................................................
310
Figure 190 Management > Syslog > Server Setup ..............................................................................
311
Figure 191 Clustering Application Example .........................................................................................
314
Figure 192 Management > Cluster Management ................................................................................
Figure 193 Cluster Management: Cluster Member Web Configurator Screen ....................................
315
Figure 194 Example: Uploading Firmware to a Cluster Member Switch .............................................
316
Figure 195 Management > Clustering Management > Configuration .................................................
317
Figure 196 MAC Table Flowchart ........................................................................................................
319
Figure 197 Management > MAC Table ................................................................................................
320
Figure 198 IP Table Flowchart .............................................................................................................
321
Figure 199 Management > IP Table ....................................................................................................
322
Figure 200 Management > ARP Table ................................................................................................
324
Figure 201 Management > Routing Table ..........................................................................................
325
Figure 202 Management > Configure Clone .......................................................................................
327
Figure 203 no port-access-authenticator Command Example ............................................................
396
Figure 204 Pop-up Blocker ...................................................................................................................
426
Figure 205 Internet Options .................................................................................................................
427
Figure 206 Internet Options ..................................................................................................................
428
Figure 207 Pop-up Blocker Settings .....................................................................................................
Figure 208 Internet Options ..................................................................................................................
429
Figure 209 Security Settings - Java Scripting .......................................................................................
430
Figure 210 Security Settings - Java ......................................................................................................
ES-4124 User’s Guide
29