Table of Contents
Chapter 26
Access Control......................................................................................................................
179
26.1
Access Control Overview ................................................................................................
26.2
The Access Control Main Screen ....................................................................................
26.3 About SNMP ..................................................................................................................
180
26.3.1 Supported MIBs .....................................................................................................
181
26.3.2 SNMP Traps ...........................................................................................................
26.3.3 Configuring SNMP .................................................................................................
182
26.4
Setting Up Login Accounts .............................................................................................
26.5
SSH Overview .................................................................................................................
184
26.6 How SSH works ...............................................................................................................
26.7
SSH Implementation on the Switch .................................................................................
185
26.7.1 Requirements for Using SSH .................................................................................
26.7.2 SSH Login Example ...............................................................................................
26.8
Introduction to HTTPS .....................................................................................................
186
26.9 HTTPS Example ..............................................................................................................
187
26.9.1 Internet Explorer Warning Messages .....................................................................
26.9.2 Netscape Navigator Warning Messages ................................................................
188
26.9.3 The Main Screen ....................................................................................................
26.10 Service Access Control ................................................................................................
189
26.11 Remote Management ...................................................................................................
190
Chapter 27
Diagnostic
..............................................................................................................................
191
27.1
Diagnostic .......................................................................................................................
Chapter 28
Syslog ....................................................................................................................................
193
28.1
Syslog Overview ..............................................................................................................
28.2
Syslog Setup ..................................................................................................................
28.3
Syslog Server Setup .......................................................................................................
194
Chapter 29
Cluster Management.............................................................................................................
197
29.1
Cluster Management Overview ......................................................................................
29.2
Cluster Management Status ............................................................................................
198
29.2.1 Cluster Member Switch Management ....................................................................
199
29.3
Configuring Cluster Management ...................................................................................
200
Chapter 30
MAC Table..............................................................................................................................
203
30.1
MAC Table Overview .....................................................................................................
30.2
Viewing the MAC Table ....................................................................................................
204
VES-1616F-3x Series User’s Guide
15