List of Figures
Figure 125 Global DHCP Relay Network Example .............................................................................
222
Figure 126 DHCP Relay Configuration Example .................................................................................
Figure 127 IP Application > DHCP > VLAN .......................................................................................
223
Figure 128 DHCP Relay for Two VLANs .............................................................................................
224
Figure 129 DHCP Relay for Two VLANs Configuration Example ........................................................
Figure 130 Management > Maintenance .............................................................................................
227
Figure 131 Load Factory Default: Start ................................................................................................
228
Figure 132 Reboot System: Confirmation ...........................................................................................
229
Figure 133 Management > Maintenance > Firmware Upgrade ..........................................................
Figure 134 Management > Maintenance > Restore Configuration ......................................................
230
Figure 135 Management > Maintenance > Backup Configuration ......................................................
Figure 136 Management > Access Control .........................................................................................
233
Figure 137 SNMP Management Model ..............................................................................................
234
Figure 138 Management > Access Control > SNMP ...........................................................................
240
Figure 139 Management > Access Control > SNMP > Trap Group ....................................................
242
Figure 140 Management > Access Control > Logins ..........................................................................
243
Figure 141 SSH Communication Example ...........................................................................................
244
Figure 142 How SSH Works .................................................................................................................
Figure 143 HTTPS Implementation ......................................................................................................
246
Figure 144 Security Alert Dialog Box (Internet Explorer) ......................................................................
Figure 145 Security Certificate 1 (Netscape) ........................................................................................
247
Figure 146 Security Certificate 2 (Netscape) ........................................................................................
Figure 147 Example: Lock Denoting a Secure Connection ..................................................................
248
Figure 148 Management > Access Control > Service Access Control ................................................
Figure 149 Management > Access Control > Remote Management ..................................................
249
Figure 150 Management > Diagnostic .................................................................................................
251
Figure 151 Management > Syslog .......................................................................................................
254
Figure 152 Management > Syslog > Syslog Server Setup ..................................................................
255
Figure 153 Clustering Application Example .........................................................................................
258
Figure 154 Management > Cluster Management: Status ....................................................................
Figure 155 Cluster Management: Cluster Member Web Configurator Screen ....................................
259
Figure 156 Example: Uploading Firmware to a Cluster Member Switch .............................................
260
Figure 157 Management > Cluster Management > Configuration .....................................................
261
Figure 158 MAC Table Flowchart ........................................................................................................
263
Figure 159 Management > MAC Table ................................................................................................
264
Figure 160 Management > ARP Table ................................................................................................
266
Figure 161 Management > Configure Clone .......................................................................................
267
Figure 162 Network Number and Host ID ............................................................................................
284
Figure 163 Subnetting Example: Before Subnetting ............................................................................
286
Figure 164 Subnetting Example: After Subnetting ...............................................................................
287
Figure 165 Conflicting Computer IP Addresses Example ....................................................................
291
Figure 166 Conflicting Computer IP Addresses Example ....................................................................
Figure 167 Conflicting Computer and Router IP Addresses Example ..................................................
292
24
GS-3012/GS-3012F User’s Guide