List of Figures
ES-2108 Series User’s Guide
24
Figure 125 Management > Access Control > Logins
..........................................................................
212
Figure 126 SSH Communication Example
...........................................................................................
213
Figure 127 How SSH Works
.................................................................................................................
214
Figure 128 SSH Login Example
..........................................................................................................
215
Figure 129 HTTPS Implementation
......................................................................................................
216
Figure 130 Security Alert Dialog Box (Internet Explorer)
......................................................................
217
Figure 131 Security Certificate 1 (Netscape)
........................................................................................
217
Figure 132 Security Certificate 2 (Netscape)
........................................................................................
218
Figure 133 Example: Lock Denoting a Secure Connection
..................................................................
218
Figure 134 Management > Access Control > Service Access Control
................................................
219
Figure 135 Management > Access Control > Remote Management
..................................................
220
Figure 136 Management > Diagnostic
.................................................................................................
221
Figure 137 Management > Syslog
.......................................................................................................
224
Figure 138 Management > Syslog > Server Setup
.............................................................................
225
Figure 139 Clustering Application Example
.........................................................................................
228
Figure 140 Management > Cluster Management: Status
....................................................................
228
Figure 141 Cluster Management: Cluster Member Web Configurator Screen
....................................
229
Figure 142 Example: Uploading Firmware to a Cluster Member Switch
.............................................
230
Figure 143 Management > Cluster Management > Configuration
.....................................................
231
Figure 144 MAC Table Flowchart
........................................................................................................
233
Figure 145 Management > MAC Table
................................................................................................
234
Figure 146 Management > ARP Table
................................................................................................
236
Figure 147 Management > Configure Clone
.......................................................................................
237
Figure 148 Pop-up Blocker
...................................................................................................................
242
Figure 149
Internet Options
.................................................................................................................
243
Figure 150 Internet Options
..................................................................................................................
244
Figure 151 Pop-up Blocker Settings
.....................................................................................................
244
Figure 152 Internet Options
..................................................................................................................
245
Figure 153 Security Settings - Java Scripting
.......................................................................................
246
Figure 154 Security Settings - Java
......................................................................................................
246
Figure 155 Java (Sun)
..........................................................................................................................
247
Figure 156 DC Power Plug
...................................................................................................................
249
Figure 157 Masonry Plug and M4 Tap Screw
.......................................................................................
251
Figure 158 Network Number and Host ID
............................................................................................
258
Figure 159 Subnetting Example: Before Subnetting
............................................................................
260
Figure 160 Subnetting Example: After Subnetting
...............................................................................
261
Figure 161 Conflicting Computer IP Addresses Example
....................................................................
265
Figure 162 Conflicting Computer IP Addresses Example
....................................................................
265
Figure 163 Conflicting Computer and Router IP Addresses Example
..................................................
266