Table of Contents

38.4.2 Two Subnets Example ...........................................................................................

325

Part V: Management.............................................................................

327

Chapter 39

 

Maintenance ..........................................................................................................................

329

39.1

The Maintenance Screen ................................................................................................

329

39.2

Load Factory Default ......................................................................................................

330

39.3

Save Configuration ..........................................................................................................

330

39.4

Reboot System ................................................................................................................

331

39.5

Firmware Upgrade ...........................................................................................................

331

39.6

Restore a Configuration File ............................................................................................

332

39.7

Backup a Configuration File ............................................................................................

333

39.8 FTP Command Line ........................................................................................................

333

39.8.1 Filename Conventions ..........................................................................................

333

39.8.2 FTP Command Line Procedure ............................................................................

334

39.8.3 GUI-based FTP Clients ..........................................................................................

335

39.8.4 FTP Restrictions ....................................................................................................

335

Chapter 40

 

Access Control......................................................................................................................

337

40.1

Access Control Overview ............................................................................................

337

40.2

The Access Control Main Screen ....................................................................................

337

40.3 About SNMP ..................................................................................................................

338

40.3.1 SNMP v3 and Security ...........................................................................................

339

40.3.2 Supported MIBs ...................................................................................................

339

40.3.3 SNMP Traps ..........................................................................................................

340

40.3.4 Configuring SNMP ..............................................................................................

344

40.3.5 Configuring SNMP Trap Group ...........................................................................

346

40.3.6 Setting Up Login Accounts ...................................................................................

347

40.4

SSH Overview .................................................................................................................

348

40.5 How SSH works ...............................................................................................................

349

40.6

SSH Implementation on the Switch .................................................................................

350

40.6.1 Requirements for Using SSH .................................................................................

350

40.7

Introduction to HTTPS .....................................................................................................

350

40.8 HTTPS Example ..............................................................................................................

351

40.8.1 Internet Explorer Warning Messages .....................................................................

351

40.8.2 Netscape Navigator Warning Messages ................................................................

352

40.8.3 The Main Screen ....................................................................................................

354

40.9

Service Port Access Control .........................................................................................

354

40.10 Remote Management ...............................................................................................

355

20

 

XGS-4728F User’s Guide