Table of Contents
33.7
Backup a Configuration File .........................................................................................
301
33.8 FTP Command Line ........................................................................................................
33.8.1 Filename Conventions ..........................................................................................
33.8.2 FTP Command Line Procedure ............................................................................
302
33.8.3 GUI-based FTP Clients ..........................................................................................
303
33.8.4 FTP Restrictions ....................................................................................................
Chapter 34
Access Control......................................................................................................................
305
34.1
Access Control Overview ............................................................................................
34.2
The Access Control Main Screen ....................................................................................
34.3 About SNMP ..................................................................................................................
306
34.3.1 SNMP v3 and Security ...........................................................................................
307
34.3.2 Supported MIBs ....................................................................................................
34.3.3 SNMP Traps ..........................................................................................................
308
34.3.4 Configuring SNMP ................................................................................................
315
34.3.5 Configuring SNMP Trap Group ...........................................................................
318
34.3.6 Setting Up Login Accounts .................................................................................
319
34.4
SSH Overview .................................................................................................................
320
34.5 How SSH works ...............................................................................................................
321
34.6
SSH Implementation on the Switch .................................................................................
322
34.6.1 Requirements for Using SSH .................................................................................
34.7
Introduction to HTTPS .....................................................................................................
34.8 HTTPS Example ..............................................................................................................
323
34.8.1 Internet Explorer Warning Messages .....................................................................
34.8.2 Netscape Navigator Warning Messages ................................................................
324
34.8.3 The Main Screen ....................................................................................................
326
34.9
Service Port Access Control .........................................................................................
34.10 Remote Management ...............................................................................................
327
Chapter 35
Diagnostic
..............................................................................................................................
329
35.1
Diagnostic .......................................................................................................................
Chapter 36
Syslog ....................................................................................................................................
331
36.1
Syslog Overview ..............................................................................................................
36.2
Syslog Setup ..................................................................................................................
332
36.3
Syslog Server Setup .......................................................................................................
333
Chapter 37
Cluster Management.............................................................................................................
335
37.1
Cluster Management Status Overview ...........................................................................
MGS-3712/MGS-3712F User’s Guide
19