Table of Contents
28.6
Restore a Configuration File .........................................................................................
230
28.7
Backup a Configuration File .........................................................................................
28.8 FTP Command Line ........................................................................................................
231
28.8.1 Filename Conventions ..........................................................................................
28.8.2 FTP Command Line Procedure ............................................................................
28.8.3 GUI-based FTP Clients ..........................................................................................
232
28.8.4 FTP Restrictions ....................................................................................................
Chapter 29
Access Control......................................................................................................................
233
29.1
Access Control Overview ............................................................................................
29.2
The Access Control Main Screen ....................................................................................
29.3 About SNMP ..................................................................................................................
234
29.3.1 SNMP v3 and Security ...........................................................................................
235
29.3.2 Supported MIBs ...................................................................................................
29.3.3 SNMP Traps ..........................................................................................................
29.3.4 Configuring SNMP ................................................................................................
239
29.3.5 Configuring SNMP Trap Group ...........................................................................
241
29.3.6 Setting Up Login Accounts .................................................................................
242
29.4
SSH Overview .................................................................................................................
244
29.5 How SSH works ...............................................................................................................
29.6
SSH Implementation on the Switch .................................................................................
245
29.6.1 Requirements for Using SSH .................................................................................
29.7
Introduction to HTTPS .....................................................................................................
29.8 HTTPS Example ..............................................................................................................
246
29.8.1 Internet Explorer Warning Messages .....................................................................
29.8.2 Netscape Navigator Warning Messages ................................................................
247
29.8.3 The Main Screen ....................................................................................................
29.9
Service Port Access Control .........................................................................................
248
29.10 Remote Management ...............................................................................................
249
Chapter 30
Diagnostic
..............................................................................................................................
251
30.1
Diagnostic .......................................................................................................................
Chapter 31
Syslog ....................................................................................................................................
253
31.1
Syslog Overview ..............................................................................................................
31.2
Syslog Setup ..................................................................................................................
31.3
Syslog Server Setup .......................................................................................................
254
Chapter 32
Cluster Management.............................................................................................................
257
18
GS-3012/GS-3012F User’s Guide