List of Figures

Figure 168 Load Factory Default: Start ................................................................................................

280

Figure 169 Reboot System: Confirmation ...........................................................................................

281

Figure 170 Firmware Upgrade ............................................................................................................

281

Figure 171 Restore Configuration .......................................................................................................

282

Figure 172 Backup Configuration ........................................................................................................

282

Figure 173 Access Control ..................................................................................................................

285

Figure 174 SNMP Management Model ..............................................................................................

286

Figure 175 Access Control: SNMP ......................................................................................................

292

Figure 176 Access Control: SNMP: Trap Group ..................................................................................

294

Figure 177 Access Control: Logins ......................................................................................................

295

Figure 178 SSH Communication Example ...........................................................................................

296

Figure 179 How SSH Works .................................................................................................................

296

Figure 180 HTTPS Implementation ......................................................................................................

298

Figure 181 Security Alert Dialog Box (Internet Explorer) ......................................................................

298

Figure 182 Security Certificate 1 (Netscape) ........................................................................................

299

Figure 183 Security Certificate 2 (Netscape) ........................................................................................

299

Figure 184 Example: Lock Denoting a Secure Connection ..................................................................

300

Figure 185 Access Control: Service Access Control ...........................................................................

300

Figure 186 Access Control: Remote Management ..............................................................................

301

Figure 187 Diagnostic ..........................................................................................................................

303

Figure 188 Syslog ................................................................................................................................

306

Figure 189 Syslog: Server Setup .........................................................................................................

307

Figure 190 Clustering Application Example .........................................................................................

310

Figure 191 Cluster Management: Status .............................................................................................

310

Cluster Management: Cluster Member Web Configurator Screen 311

 

Example: Uploading Firmware to a Cluster Member Switch 312

 

Figure 194 Clustering Management Configuration .............................................................................

313

Figure 195 MAC Table Flowchart ........................................................................................................

315

Figure 196 MAC Table .........................................................................................................................

316

Figure 197 IP Table Flowchart .............................................................................................................

317

Figure 198 IP Table .............................................................................................................................

318

Figure 199 ARP Table .........................................................................................................................

320

Figure 200 Routing Table Status .........................................................................................................

321

Figure 201 Configure Clone ................................................................................................................

323

Figure 202 no port-access-authenticator Command Example ............................................................

389

Figure 203 Pop-up Blocker ...................................................................................................................

416

Figure 204 Internet Options .................................................................................................................

417

Figure 205 Internet Options ..................................................................................................................

418

Figure 206 Pop-up Blocker Settings .....................................................................................................

418

Figure 207 Internet Options ..................................................................................................................

419

Figure 208 Security Settings - Java Scripting .......................................................................................

420

Figure 209 Security Settings - Java ......................................................................................................

420

Figure 210 Java (Sun) ..........................................................................................................................

421

GS-4012F/4024 User’s Guide

29