List of Figures

Figure 82 Backup Configuration ..........................................................................................................

175

Figure 83 Access Control ....................................................................................................................

180

Figure 84 SNMP Management Model .................................................................................................

180

Figure 85 Access Control: SNMP ........................................................................................................

182

Figure 86 Access Control: Logins ........................................................................................................

183

Figure 87 SSH Communication Example .............................................................................................

184

Figure 88 How SSH Works ...................................................................................................................

184

Figure 89 SSH Login Example ............................................................................................................

186

Figure 90 HTTPS Implementation ........................................................................................................

187

Figure 91 Security Alert Dialog Box (Internet Explorer) ........................................................................

187

Figure 92 Security Certificate 1 (Netscape) ..........................................................................................

188

Figure 93 Security Certificate 2 (Netscape) ..........................................................................................

188

Figure 94 Example: Lock Denoting a Secure Connection ....................................................................

189

Figure 95 Access Control: Service Access Control .............................................................................

189

Figure 96 Access Control: Remote Management ................................................................................

190

Figure 97 Diagnostic ............................................................................................................................

191

Figure 98 Syslog Setup .......................................................................................................................

194

Figure 99 Syslog Server Setup ............................................................................................................

195

Figure 100 Clustering Application Example .........................................................................................

197

Figure 101 Cluster Management Status ..............................................................................................

198

Figure 102 Cluster Management: Cluster Member Web Configurator Screen ....................................

199

Figure 103 Example: Uploading Firmware to a Cluster Member Switch .............................................

199

Figure 104 Clustering Management Configuration .............................................................................

200

Figure 105 MAC Table Flowchart ........................................................................................................

203

Figure 106 MAC Table .........................................................................................................................

204

Figure 107 ARP Table .........................................................................................................................

206

Figure 108 Pop-up Blocker ...................................................................................................................

269

Figure 109 Internet Options .................................................................................................................

269

Figure 110 Internet Options ..................................................................................................................

270

Figure 111 Pop-up Blocker Settings .....................................................................................................

270

Figure 112 Internet Options ..................................................................................................................

271

Figure 113 Security Settings - Java Scripting .......................................................................................

272

Figure 114 Security Settings - Java ......................................................................................................

272

Figure 115 Java (Sun) ..........................................................................................................................

273

Figure 116 Hardware Telco-50 Pin Assignments ..................................................................................

279

Figure 117 Telco-50 Cable VDSL Telco-50 Pin Assignments ...............................................................

280

Figure 118 Telco-50 Cable POTS/ISDN Telco-50 Pin Assignments .....................................................

280

Figure 119 Console Cable DB-9 End Pin Layout .................................................................................

281

Figure 120 Network Number and Host ID ............................................................................................

286

Figure 121 Subnetting Example: Before Subnetting ............................................................................

288

Figure 122 Subnetting Example: After Subnetting ...............................................................................

289

Figure 123 Conflicting Computer IP Addresses Example ....................................................................

293

Figure 124 Conflicting Computer IP Addresses Example ....................................................................

293

VES-1616F-3x Series User’s Guide

23