Table of Contents

33.7

Backup a Configuration File .........................................................................................

301

33.8 FTP Command Line ........................................................................................................

301

33.8.1 Filename Conventions ..........................................................................................

301

33.8.2 FTP Command Line Procedure ............................................................................

302

33.8.3 GUI-based FTP Clients ..........................................................................................

303

33.8.4 FTP Restrictions ....................................................................................................

303

Chapter 34

 

Access Control......................................................................................................................

305

34.1

Access Control Overview ............................................................................................

305

34.2

The Access Control Main Screen ....................................................................................

305

34.3 About SNMP ..................................................................................................................

306

34.3.1 SNMP v3 and Security ...........................................................................................

307

34.3.2 Supported MIBs ....................................................................................................

307

34.3.3 SNMP Traps ..........................................................................................................

308

34.3.4 Configuring SNMP ................................................................................................

315

34.3.5 Configuring SNMP Trap Group ...........................................................................

318

34.3.6 Setting Up Login Accounts .................................................................................

319

34.4

SSH Overview .................................................................................................................

320

34.5 How SSH works ...............................................................................................................

321

34.6

SSH Implementation on the Switch .................................................................................

322

34.6.1 Requirements for Using SSH .................................................................................

322

34.7

Introduction to HTTPS .....................................................................................................

322

34.8 HTTPS Example ..............................................................................................................

323

34.8.1 Internet Explorer Warning Messages .....................................................................

323

34.8.2 Netscape Navigator Warning Messages ................................................................

324

34.8.3 The Main Screen ....................................................................................................

326

34.9

Service Port Access Control .........................................................................................

326

34.10 Remote Management ...............................................................................................

327

Chapter 35

 

Diagnostic

..............................................................................................................................

329

35.1

Diagnostic .......................................................................................................................

329

Chapter 36

 

Syslog ....................................................................................................................................

331

36.1

Syslog Overview ..............................................................................................................

331

36.2

Syslog Setup ..................................................................................................................

332

36.3

Syslog Server Setup .......................................................................................................

333

Chapter 37

 

Cluster Management.............................................................................................................

335

37.1

Cluster Management Status Overview ...........................................................................

335

MGS-3712/MGS-3712F User’s Guide

19