List of Figures
XGS-4528F User’s Guide 27
Figure 168 Load Factory Default: Start ................................................................................................. 280
Figure 169 Reboot System: Confirmation ............................................................................................ 281
Figure 170 Management > Maintenance > Firmware Upgrade ............................................................ 281
Figure 171 Management > Maintenance > Restore Configuration ....................................................... 282
Figure 172 Management > Maintenance > Backup Configuration ....................................................... 282
Figure 173 Management > Access Control .......................................................................................... 285
Figure 174 SNMP Management Model ...................... ........................................................................ 286
Figure 175 Management > Access Control > SNMP ............................................................................ 291
Figure 176 Management > Access Control > SNMP > Trap Group ............. ........................................ 293
Figure 177 Management > Access Control > Logins ........................................................................... 294
Figure 178 SSH Communication Example ......................................................... ..................................295
Figure 179 How SSH Works ................................................................................................................. 2 95
Figure 180 HTTPS Implementation ...................................................................................................... 297
Figure 181 Security Alert Dialog Box (Internet Explorer) ...................................................................... 297
Figure 182 Security Certificate 1 (Netscape) ........................................................................................ 298
Figure 183 Security Certificate 2 (Netscape) ........................................................................................ 298
Figure 184 Example: Lock Denoting a Secure Connection .................................................................. 299
Figure 185 Management > Access Control > Service Access Control ................................................. 299
Figure 186 Management > Access Control > Remote Management ................................................... 300
Figure 187 Management > Diagnostic .................................................................................................. 303
Figure 188 Management > Syslog ........................................................................................................ 306
Figure 189 Management > Syslog > Server Setup .............................................................................. 307
Figure 190 Clustering Application Example .......................................................................................... 310
Figure 191 Management > Cluster Management ................................................................................. 310
Figure 192 Cluster Management: Cluster Member Web Configurator Screen ......................................311
Figure 193 Example: Uploading Firmware to a Cluster Member Switch ......................................... .....312
Figure 194 Management > Clustering Management > Configuration ................................................... 313
Figure 195 MAC Table Flowchart .................................................................................... .....................316
Figure 196 Management > MAC Table ................................................................................................. 316
Figure 197 IP Table Flowchart .............................................................................................................. 317
Figure 198 Management > IP Table ....................................................................... ..............................318
Figure 199 Management > ARP Table ................................................................... ..............................320
Figure 200 Management > Routing Table ................................................................ ...........................3 21
Figure 201 Management > Configure Clone ...... ..................................................................................323
Figure 202 Pop-up Blocker ........................................................................................ ...........................328
Figure 203 Internet Options ....................................................................................... ...........................329
Figure 204 Internet Options ....................................................................................... ...........................330
Figure 205 Pop-up Blocker Settings ................................................................................ .....................330
Figure 206 Internet Options ....................................................................................... ...........................331
Figure 207 Security Settings - Java Scripting ....................................................................................... 332
Figure 208 Security Settings - Java ...................................................................................................... 332
Figure 209 Java (Sun) ..................................................... ..................................................................... 333
Figure 210 Network Number and Host ID ............................................................................................ 346