Table of Contents

Chapter

39

 

Access Control .....................................................................................................................

292

39.1

Access Control Overview .............................................................................................

292

39.2

The Access Control Main Screen .....................................................................................

292

39.3 About SNMP ...................................................................................................................

292

 

39.3.1 SNMP v3 and Security ...........................................................................................

293

 

39.3.2 Supported MIBs .....................................................................................................

294

 

39.3.3 SNMP Traps ...........................................................................................................

294

 

39.3.4 Configuring SNMP .................................................................................................

301

 

39.3.5 Configuring SNMP Trap Group ............................................................................

302

 

39.3.6 Configuring SNMP User ......................................................................................

303

39.4

Setting Up Login Accounts ...........................................................................................

305

39.5

SSH Overview ..................................................................................................................

306

39.6 How SSH works ...............................................................................................................

307

39.7

SSH Implementation on the Switch ..................................................................................

308

 

39.7.1 Requirements for Using SSH ..................................................................................

308

39.8

Introduction to HTTPS ......................................................................................................

308

39.9 HTTPS Example ..............................................................................................................

309

 

39.9.1 Internet Explorer Warning Messages .....................................................................

309

 

39.9.2 Mozilla Firefox Warning Messages .........................................................................

312

 

39.9.3 The Main Screen ....................................................................................................

313

39.10 Service Port Access Control .......................................................................................

314

39.11 Remote Management ................................................................................................

315

Chapter

40

 

Diagnostic

.............................................................................................................................

317

40.1

Diagnostic .......................................................................................................................

317

Chapter

41

 

Syslog ....................................................................................................................................

 

318

41.1

Syslog Overview ..............................................................................................................

318

41.2

Syslog Setup ...................................................................................................................

319

41.3

Syslog Server Setup .......................................................................................................

320

Chapter

42

 

Cluster Management ............................................................................................................

321

42.1

Cluster Management Status Overview ............................................................................

321

42.2

Cluster Management Status ............................................................................................

322

 

42.2.1 Cluster Member Switch Management ...................................................................

323

42.3

Clustering Management Configuration ............................................................................

325

Chapter

43

 

MAC Table

.............................................................................................................................

327

14

 

ES3500 Series User’s Guide