List of Figures
ES-3148 User’s Guide
24
Figure 125 IP Application > DHCP Status
...........................................................................................
234
Figure 126 IP Application > DHCP > Global
........................................................................................
235
Figure 127 Global DHCP Relay Network Example
.............................................................................
236
Figure 128 DHCP Relay Configuration Example
.................................................................................
236
Figure 129 IP Application > DHCP > VLAN
.......................................................................................
237
Figure 130 DHCP Relay for Two VLANs
.............................................................................................
238
Figure 131 DHCP Relay for Two VLANs Configuration Example
........................................................
238
Figure 132 Management > Maintenance
.............................................................................................
239
Figure 133 Load Factory Default: Start
................................................................................................
240
Figure 134 Reboot System: Confirmation
...........................................................................................
241
Figure 135 Management > Maintenance > Firmware Upgrade
...........................................................
241
Figure 136 Management > Maintenance > Restore Configuration
......................................................
242
Figure 137 Management > Maintenance > Backup Configuration
......................................................
242
Figure 138 Management > Access Control
.........................................................................................
245
Figure 139 SNMP Management Model
..............................................................................................
246
Figure 140 Management > Access Control > SNMP
...........................................................................
251
Figure 141 Management > Access Control > SNMP > Trap Group
....................................................
253
Figure 142 Management > Access Control > Logins
..........................................................................
254
Figure 143 SSH Communication Example
...........................................................................................
255
Figure 144 How SSH Works
.................................................................................................................
255
Figure 145 HTTPS Implementation
......................................................................................................
257
Figure 146 Security Alert Dialog Box (Internet Explorer)
......................................................................
257
Figure 147 Security Certificate 1 (Netscape)
........................................................................................
258
Figure 148 Security Certificate 2 (Netscape)
........................................................................................
258
Figure 149 Example: Lock Denoting a Secure Connection
..................................................................
259
Figure 150 Management > Access Control > Service Access Control
.................................................
259
Figure 151 Management > Access Control > Remote Management
..................................................
260
Figure 152 Management > Diagnostic
.................................................................................................
263
Figure 153 Management > Syslog
.......................................................................................................
266
Figure 154 Management > Syslog > Server Setup
.............................................................................
267
Figure 155 Clustering Application Example
.........................................................................................
270
Figure 156 Management > Cluster Management
................................................................................
270
Figure 157 Cluster Management: Cluster Member Web Configurator Screen
....................................
271
Figure 158 Example: Uploading Firmware to a Cluster Member Switch
.............................................
272
Figure 159 Management > Clustering Management > Configuration
..................................................
273
Figure 160 MAC Table Flowchart
........................................................................................................
275
Figure 161 Management > MAC Table
................................................................................................
276
Figure 162 Management > ARP Table
................................................................................................
278
Figure 163 Management > Configure Clone
.......................................................................................
279
Figure 164 Console/Dial Backup Port Pin Layout
...............................................................................
291
Figure 165 WIndows 95/98/Me: Network: Configuration
......................................................................
296
Figure 166 Windows 95/98/Me: TCP/IP Properties: IP Address
..........................................................
297
Figure 167 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
..............................................
298