List of Figures
Figure 168 Load Factory Default: Start ................................................................................................
280
Figure 169 Reboot System: Confirmation ...........................................................................................
281
Figure 170 Firmware Upgrade ............................................................................................................
Figure 171 Restore Configuration .......................................................................................................
282
Figure 172 Backup Configuration ........................................................................................................
Figure 173 Access Control ..................................................................................................................
285
Figure 174 SNMP Management Model ..............................................................................................
286
Figure 175 Access Control: SNMP ......................................................................................................
292
Figure 176 Access Control: SNMP: Trap Group ..................................................................................
294
Figure 177 Access Control: Logins ......................................................................................................
295
Figure 178 SSH Communication Example ...........................................................................................
296
Figure 179 How SSH Works .................................................................................................................
Figure 180 HTTPS Implementation ......................................................................................................
298
Figure 181 Security Alert Dialog Box (Internet Explorer) ......................................................................
Figure 182 Security Certificate 1 (Netscape) ........................................................................................
299
Figure 183 Security Certificate 2 (Netscape) ........................................................................................
Figure 184 Example: Lock Denoting a Secure Connection ..................................................................
300
Figure 185 Access Control: Service Access Control ...........................................................................
Figure 186 Access Control: Remote Management ..............................................................................
301
Figure 187 Diagnostic ..........................................................................................................................
303
Figure 188 Syslog ................................................................................................................................
306
Figure 189 Syslog: Server Setup .........................................................................................................
307
Figure 190 Clustering Application Example .........................................................................................
310
Figure 191 Cluster Management: Status .............................................................................................
Cluster Management: Cluster Member Web Configurator Screen 311
Example: Uploading Firmware to a Cluster Member Switch 312
Figure 194 Clustering Management Configuration .............................................................................
313
Figure 195 MAC Table Flowchart ........................................................................................................
315
Figure 196 MAC Table .........................................................................................................................
316
Figure 197 IP Table Flowchart .............................................................................................................
317
Figure 198 IP Table .............................................................................................................................
318
Figure 199 ARP Table .........................................................................................................................
320
Figure 200 Routing Table Status .........................................................................................................
321
Figure 201 Configure Clone ................................................................................................................
323
Figure 202 no port-access-authenticator Command Example ............................................................
389
Figure 203 Pop-up Blocker ...................................................................................................................
416
Figure 204 Internet Options .................................................................................................................
417
Figure 205 Internet Options ..................................................................................................................
418
Figure 206 Pop-up Blocker Settings .....................................................................................................
Figure 207 Internet Options ..................................................................................................................
419
Figure 208 Security Settings - Java Scripting .......................................................................................
420
Figure 209 Security Settings - Java ......................................................................................................
Figure 210 Java (Sun) ..........................................................................................................................
421
GS-4012F/4024 User’s Guide
29