List of Figures
ES-4124 User’s Guide
29
Figure 168 VRRP Example 2: VRRP Status on Switch B
...................................................................
281
Figure 169
Management > Maintenance
............................................................................................
285
Figure 170 Load Factory Default: Start
................................................................................................
286
Figure 171 Reboot System: Confirmation
...........................................................................................
287
Figure 172
Management > Maintenance > Firmware Upgrade
..........................................................
287
Figure 173 Management > Maintenance > Restore Configuration
......................................................
288
Figure 174 Management > Maintenance > Backup Configuration
......................................................
288
Figure 175 Management > Access Control
.........................................................................................
291
Figure 176 SNMP Management Model
..............................................................................................
292
Figure 177 Management > Access Control > SNMP
...........................................................................
297
Figure 178 Management > Access Control > SNMP > Trap Group
....................................................
299
Figure 179 Management > Access Control > Logins
..........................................................................
300
Figure 180 SSH Communication Example
...........................................................................................
301
Figure 181 How SSH Works
.................................................................................................................
301
Figure 182 HTTPS Implementation
......................................................................................................
303
Figure 183 Security Alert Dialog Box (Internet Explorer)
......................................................................
303
Figure 184 Security Certificate 1 (Netscape)
........................................................................................
304
Figure 185 Security Certificate 2 (Netscape)
........................................................................................
304
Figure 186 Example: Lock Denoting a Secure Connection
..................................................................
305
Figure 187 Management > Access Control > Service Access Control
................................................
305
Figure 188 Management > Access Control > Remote Management
..................................................
306
Figure 189 Management > Diagnostic
.................................................................................................
309
Figure 190 Management > Syslog
.......................................................................................................
312
Figure 191 Management > Syslog > Server Setup
.............................................................................
313
Figure 192 Clustering Application Example
.........................................................................................
316
Figure 193 Management > Cluster Management
................................................................................
316
Figure 194 Cluster Management: Cluster Member Web Configurator Screen
....................................
317
Figure 195 Example: Uploading Firmware to a Cluster Member Switch
.............................................
318
Figure 196 Management > Clustering Management > Configuration
.................................................
319
Figure 197 MAC Table Flowchart
........................................................................................................
321
Figure 198 Management > MAC Table
................................................................................................
322
Figure 199 IP Table Flowchart
.............................................................................................................
323
Figure 200 Management > IP Table
....................................................................................................
324
Figure 201 Management > ARP Table
................................................................................................
326
Figure 202 Management > Routing Table
..........................................................................................
327
Figure 203 Management > Configure Clone
.......................................................................................
329
Figure 204 no port-access-authenticator Command Example
............................................................
398
Figure 205 Pop-up Blocker
...................................................................................................................
428
Figure 206
Internet Options
.................................................................................................................
429
Figure 207 Internet Options
..................................................................................................................
430
Figure 208 Pop-up Blocker Settings
.....................................................................................................
430
Figure 209 Internet Options
..................................................................................................................
431
Figure 210 Security Settings - Java Scripting
.......................................................................................
432