Table of Contents

Chapter 26

 

Access Control......................................................................................................................

179

26.1

Access Control Overview ................................................................................................

179

26.2

The Access Control Main Screen ....................................................................................

179

26.3 About SNMP ..................................................................................................................

180

26.3.1 Supported MIBs .....................................................................................................

181

26.3.2 SNMP Traps ...........................................................................................................

181

26.3.3 Configuring SNMP .................................................................................................

182

26.4

Setting Up Login Accounts .............................................................................................

182

26.5

SSH Overview .................................................................................................................

184

26.6 How SSH works ...............................................................................................................

184

26.7

SSH Implementation on the Switch .................................................................................

185

26.7.1 Requirements for Using SSH .................................................................................

185

26.7.2 SSH Login Example ...............................................................................................

185

26.8

Introduction to HTTPS .....................................................................................................

186

26.9 HTTPS Example ..............................................................................................................

187

26.9.1 Internet Explorer Warning Messages .....................................................................

187

26.9.2 Netscape Navigator Warning Messages ................................................................

188

26.9.3 The Main Screen ....................................................................................................

188

26.10 Service Access Control ................................................................................................

189

26.11 Remote Management ...................................................................................................

190

Chapter 27

 

Diagnostic

..............................................................................................................................

191

27.1

Diagnostic .......................................................................................................................

191

Chapter 28

 

Syslog ....................................................................................................................................

193

28.1

Syslog Overview ..............................................................................................................

193

28.2

Syslog Setup ..................................................................................................................

193

28.3

Syslog Server Setup .......................................................................................................

194

Chapter 29

 

Cluster Management.............................................................................................................

197

29.1

Cluster Management Overview ......................................................................................

197

29.2

Cluster Management Status ............................................................................................

198

29.2.1 Cluster Member Switch Management ....................................................................

199

29.3

Configuring Cluster Management ...................................................................................

200

Chapter 30

 

MAC Table..............................................................................................................................

203

30.1

MAC Table Overview .....................................................................................................

203

30.2

Viewing the MAC Table ....................................................................................................

204

VES-1616F-3x Series User’s Guide

15