Table of Contents

28.6

Restore a Configuration File .........................................................................................

230

28.7

Backup a Configuration File .........................................................................................

230

28.8 FTP Command Line ........................................................................................................

231

28.8.1 Filename Conventions ..........................................................................................

231

28.8.2 FTP Command Line Procedure ............................................................................

231

28.8.3 GUI-based FTP Clients ..........................................................................................

232

28.8.4 FTP Restrictions ....................................................................................................

232

Chapter 29

 

Access Control......................................................................................................................

233

29.1

Access Control Overview ............................................................................................

233

29.2

The Access Control Main Screen ....................................................................................

233

29.3 About SNMP ..................................................................................................................

234

29.3.1 SNMP v3 and Security ...........................................................................................

235

29.3.2 Supported MIBs ...................................................................................................

235

29.3.3 SNMP Traps ..........................................................................................................

235

29.3.4 Configuring SNMP ................................................................................................

239

29.3.5 Configuring SNMP Trap Group ...........................................................................

241

29.3.6 Setting Up Login Accounts .................................................................................

242

29.4

SSH Overview .................................................................................................................

244

29.5 How SSH works ...............................................................................................................

244

29.6

SSH Implementation on the Switch .................................................................................

245

29.6.1 Requirements for Using SSH .................................................................................

245

29.7

Introduction to HTTPS .....................................................................................................

245

29.8 HTTPS Example ..............................................................................................................

246

29.8.1 Internet Explorer Warning Messages .....................................................................

246

29.8.2 Netscape Navigator Warning Messages ................................................................

247

29.8.3 The Main Screen ....................................................................................................

247

29.9

Service Port Access Control .........................................................................................

248

29.10 Remote Management ...............................................................................................

249

Chapter 30

 

Diagnostic

..............................................................................................................................

251

30.1

Diagnostic .......................................................................................................................

251

Chapter 31

 

Syslog ....................................................................................................................................

253

31.1

Syslog Overview ..............................................................................................................

253

31.2

Syslog Setup ..................................................................................................................

253

31.3

Syslog Server Setup .......................................................................................................

254

Chapter 32

 

Cluster Management.............................................................................................................

257

18

 

GS-3012/GS-3012F User’s Guide