List of Figures
Figure 82 Backup Configuration ..........................................................................................................
175
Figure 83 Access Control ....................................................................................................................
180
Figure 84 SNMP Management Model .................................................................................................
Figure 85 Access Control: SNMP ........................................................................................................
182
Figure 86 Access Control: Logins ........................................................................................................
183
Figure 87 SSH Communication Example .............................................................................................
184
Figure 88 How SSH Works ...................................................................................................................
Figure 89 SSH Login Example ............................................................................................................
186
Figure 90 HTTPS Implementation ........................................................................................................
187
Figure 91 Security Alert Dialog Box (Internet Explorer) ........................................................................
Figure 92 Security Certificate 1 (Netscape) ..........................................................................................
188
Figure 93 Security Certificate 2 (Netscape) ..........................................................................................
Figure 94 Example: Lock Denoting a Secure Connection ....................................................................
189
Figure 95 Access Control: Service Access Control .............................................................................
Figure 96 Access Control: Remote Management ................................................................................
190
Figure 97 Diagnostic ............................................................................................................................
191
Figure 98 Syslog Setup .......................................................................................................................
194
Figure 99 Syslog Server Setup ............................................................................................................
195
Figure 100 Clustering Application Example .........................................................................................
197
Figure 101 Cluster Management Status ..............................................................................................
198
Figure 102 Cluster Management: Cluster Member Web Configurator Screen ....................................
199
Figure 103 Example: Uploading Firmware to a Cluster Member Switch .............................................
Figure 104 Clustering Management Configuration .............................................................................
200
Figure 105 MAC Table Flowchart ........................................................................................................
203
Figure 106 MAC Table .........................................................................................................................
204
Figure 107 ARP Table .........................................................................................................................
206
Figure 108 Pop-up Blocker ...................................................................................................................
269
Figure 109 Internet Options .................................................................................................................
Figure 110 Internet Options ..................................................................................................................
270
Figure 111 Pop-up Blocker Settings .....................................................................................................
Figure 112 Internet Options ..................................................................................................................
271
Figure 113 Security Settings - Java Scripting .......................................................................................
272
Figure 114 Security Settings - Java ......................................................................................................
Figure 115 Java (Sun) ..........................................................................................................................
273
Figure 116 Hardware Telco-50 Pin Assignments ..................................................................................
279
Figure 117 Telco-50 Cable VDSL Telco-50 Pin Assignments ...............................................................
280
Figure 118 Telco-50 Cable POTS/ISDN Telco-50 Pin Assignments .....................................................
Figure 119 Console Cable DB-9 End Pin Layout .................................................................................
281
Figure 120 Network Number and Host ID ............................................................................................
286
Figure 121 Subnetting Example: Before Subnetting ............................................................................
288
Figure 122 Subnetting Example: After Subnetting ...............................................................................
289
Figure 123 Conflicting Computer IP Addresses Example ....................................................................
293
Figure 124 Conflicting Computer IP Addresses Example ....................................................................
VES-1616F-3x Series User’s Guide
23