List of Figures

Figure 82 MVR Configuration Example ...............................................................................................

160

Figure 83 DHCP Relay ........................................................................................................................

162

Figure 84 Static Routing ......................................................................................................................

165

Figure 85 Static Routing: Summary Table ...........................................................................................

166

Figure 86 Maintenance ........................................................................................................................

167

Figure 87 Firmware Upgrade ...............................................................................................................

168

Figure 88 Restore Configuration .........................................................................................................

169

Figure 89 Backup Configuration ..........................................................................................................

169

Figure 90 Confirm Load Factory Defaults ............................................................................................

170

Figure 91 Close Browser after Load Factory Defaults ..........................................................................

170

Figure 92 Reboot System: Confirmation .............................................................................................

171

Figure 93 Access Control ....................................................................................................................

175

Figure 94 Console Port Priority ..........................................................................................................

176

Figure 95 SNMP Management Model .................................................................................................

176

Figure 96 Access Control: SNMP ........................................................................................................

178

Figure 97 Access Control: Logins ........................................................................................................

179

Figure 98 SSH Communication Example ............................................................................................

180

Figure 99 How SSH Works ..................................................................................................................

180

Figure 100 HTTPS Implementation .....................................................................................................

181

Figure 101 Security Alert Dialog Box (Internet Explorer) .....................................................................

182

Figure 102 Security Certificate 1 (Netscape) .......................................................................................

183

Figure 103 Security Certificate 2 (Netscape) .......................................................................................

183

Figure 104 Example: Lock Denoting a Secure Connection ................................................................

184

Figure 105 Access Control: Service Access Control ...........................................................................

184

Figure 106 Access Control: Remote Management ..............................................................................

185

Figure 107 Diagnostic ..........................................................................................................................

187

Figure 108 Syslog Setup .....................................................................................................................

190

Figure 109 Syslog Server Setup ..........................................................................................................

191

Figure 110 Clustering Application Example .........................................................................................

193

Figure 111 Cluster Management Status ...............................................................................................

194

Figure 112 Cluster Member Web Configuration Screen ......................................................................

195

Figure 113 Example: Uploading Firmware to a Cluster Member Switch .............................................

195

Figure 114 Configuring Cluster Management ......................................................................................

196

Figure 115 MAC Table Flowchart ........................................................................................................

199

Figure 116 MAC Table .........................................................................................................................

200

Figure 117 ARP Table ..........................................................................................................................

202

Figure 118 Configure Clone .................................................................................................................

203

Figure 119 Initial Console Port Screen ................................................................................................

208

Figure 120 CLI: Login Screen ..............................................................................................................

209

Figure 121 CLI Help: List of Commands: Example 1 ..........................................................................

210

Figure 122 CLI Help: List of Commands: Example 2 ..........................................................................

210

Figure 123 CLI Help: Detailed Command Information: Example 1 .......................................................

211

Figure 124 CLI: Help: Detailed Command Information: Example 2 ......................................................

211

GS-3012/GS-3012F User’s Guide

23