Table of Contents
VES1724-56 User’s Guide
14
35.4.3 Sub-Option Format
.................................................................................................
313
35.4.4 Configuring DHCP Global Relay
............................................................................
314
35.4.5 Global DHCP Relay Configuration Example
..........................................................
317
35.5 Configuring DHCP VLAN Settings
................................................................................
318
35.5.1 Example: DHCP Relay for Two VLANs
..................................................................
320
35.6 DHCPv6 LDRA
.................................................................................................................
321
35.6.1 DHCPv6 Counter
....................................................................................................
324
35.6.2 Snooping Configure
................................................................................................
324
Chapter
36
Maintenance
..........................................................................................................................
327
36.1 The Maintenance Screen
...............................................................................................
327
36.2 Firmware Upgrade
...........................................................................................................
328
36.2.1 Dual Firmware Image
.............................................................................................
328
36.3 Restore a Configuration File
............................................................................................
329
36.4 Backup a Configuration File
.............................................................................................
330
36.5 Load Factory Default
.......................................................................................................
330
36.6 Save Configuration
...........................................................................................................
331
36.7 Reboot System
.................................................................................................................
331
36.8 FTP Command Line
.........................................................................................................
331
36.8.1 Filename Conventions
...........................................................................................
331
36.8.2 FTP Command Line Procedure
.............................................................................
332
36.8.3 GUI-based FTP Clients
...........................................................................................
333
36.8.4 FTP Restrictions
....................................................................................................
333
Chapter
37
Access Control
.....................................................................................................................
334
37.1 Access Control Overview
................................................................................................
334
37.2 The Access Control Main Screen
.....................................................................................
334
37.3 About SNMP
..................................................................................................................
334
37.3.1 SNMP v3 and Security
...........................................................................................
335
37.3.2 Supported MIBs
......................................................................................................
336
37.3.3 SNMP Traps
...........................................................................................................
336
37.3.4 Configuring SNMP
.................................................................................................
342
37.3.5 Configuring SNMP Trap Group
............................................................................
344
37.3.6 Setting Up Login Accounts
.................................................................................
344
37.4 SSH Overview
..................................................................................................................
346
37.5 How SSH works
...............................................................................................................
346
37.6 SSH Implementation on the Switch
..................................................................................
347
37.6.1 Requirements for Using SSH
..................................................................................
347
37.7 Introduction to HTTPS
......................................................................................................
347
37.8 HTTPS Example
..............................................................................................................
348
37.8.1 Internet Explorer Warning Messages
.....................................................................
348