List of Figures

 

 

Figure 125 Global DHCP Relay Network Example .............................................................................

222

Figure 126 DHCP Relay Configuration Example .................................................................................

222

Figure 127 IP Application > DHCP > VLAN .......................................................................................

223

Figure 128 DHCP Relay for Two VLANs .............................................................................................

224

Figure 129 DHCP Relay for Two VLANs Configuration Example ........................................................

224

Figure 130 Management > Maintenance .............................................................................................

227

Figure 131 Load Factory Default: Start ................................................................................................

228

Figure 132 Reboot System: Confirmation ...........................................................................................

229

Figure 133 Management > Maintenance > Firmware Upgrade ..........................................................

229

Figure 134 Management > Maintenance > Restore Configuration ......................................................

230

Figure 135 Management > Maintenance > Backup Configuration ......................................................

230

Figure 136 Management > Access Control .........................................................................................

233

Figure 137 SNMP Management Model ..............................................................................................

234

Figure 138 Management > Access Control > SNMP ...........................................................................

240

Figure 139 Management > Access Control > SNMP > Trap Group ....................................................

242

Figure 140 Management > Access Control > Logins ..........................................................................

243

Figure 141 SSH Communication Example ...........................................................................................

244

Figure 142 How SSH Works .................................................................................................................

244

Figure 143 HTTPS Implementation ......................................................................................................

246

Figure 144 Security Alert Dialog Box (Internet Explorer) ......................................................................

246

Figure 145 Security Certificate 1 (Netscape) ........................................................................................

247

Figure 146 Security Certificate 2 (Netscape) ........................................................................................

247

Figure 147 Example: Lock Denoting a Secure Connection ..................................................................

248

Figure 148 Management > Access Control > Service Access Control ................................................

248

Figure 149 Management > Access Control > Remote Management ..................................................

249

Figure 150 Management > Diagnostic .................................................................................................

251

Figure 151 Management > Syslog .......................................................................................................

254

Figure 152 Management > Syslog > Syslog Server Setup ..................................................................

255

Figure 153 Clustering Application Example .........................................................................................

258

Figure 154 Management > Cluster Management: Status ....................................................................

258

Figure 155 Cluster Management: Cluster Member Web Configurator Screen ....................................

259

Figure 156 Example: Uploading Firmware to a Cluster Member Switch .............................................

260

Figure 157 Management > Cluster Management > Configuration .....................................................

261

Figure 158 MAC Table Flowchart ........................................................................................................

263

Figure 159 Management > MAC Table ................................................................................................

264

Figure 160 Management > ARP Table ................................................................................................

266

Figure 161 Management > Configure Clone .......................................................................................

267

Figure 162 Network Number and Host ID ............................................................................................

284

Figure 163 Subnetting Example: Before Subnetting ............................................................................

286

Figure 164 Subnetting Example: After Subnetting ...............................................................................

287

Figure 165 Conflicting Computer IP Addresses Example ....................................................................

291

Figure 166 Conflicting Computer IP Addresses Example ....................................................................

291

Figure 167 Conflicting Computer and Router IP Addresses Example ..................................................

292

24

GS-3012/GS-3012F User’s Guide