List of Figures
GS-4012F/4024 User’s Guide
29
Figure 168
Maintenance
.....................................................................................................................
279
Figure 169 Load Factory Default: Start
................................................................................................
280
Figure 170 Reboot System: Confirmation
...........................................................................................
281
Figure 171
Firmware Upgrade
............................................................................................................
281
Figure 172 Restore Configuration
.......................................................................................................
282
Figure 173 Backup Configuration
........................................................................................................
282
Figure 174 Access Control
..................................................................................................................
285
Figure 175 SNMP Management Model
..............................................................................................
286
Figure 176 Access Control: SNMP
......................................................................................................
292
Figure 177 Access Control: SNMP: Trap Group
..................................................................................
294
Figure 178 Access Control: Logins
......................................................................................................
295
Figure 179 SSH Communication Example
...........................................................................................
296
Figure 180 How SSH Works
.................................................................................................................
296
Figure 181 HTTPS Implementation
......................................................................................................
298
Figure 182 Security Alert Dialog Box (Internet Explorer)
......................................................................
298
Figure 183 Security Certificate 1 (Netscape)
........................................................................................
299
Figure 184 Security Certificate 2 (Netscape)
........................................................................................
299
Figure 185 Example: Lock Denoting a Secure Connection
..................................................................
300
Figure 186 Access Control: Service Access Control
...........................................................................
300
Figure 187 Access Control: Remote Management
..............................................................................
301
Figure 188 Diagnostic
..........................................................................................................................
303
Figure 189 Syslog
................................................................................................................................
306
Figure 190 Syslog: Server Setup
.........................................................................................................
307
Figure 191 Clustering Application Example
.........................................................................................
310
Figure 192 Cluster Management: Status
.............................................................................................
310
Cluster Management: Cluster Member Web Configurator Screen
311
Example: Uploading Firmware to a Cluster Member Switch
312
Figure 195 Clustering Management Configuration
.............................................................................
313
Figure 196 MAC Table Flowchart
........................................................................................................
315
Figure 197 MAC Table
.........................................................................................................................
316
Figure 198 IP Table Flowchart
.............................................................................................................
317
Figure 199 IP Table
.............................................................................................................................
318
Figure 200 ARP Table
.........................................................................................................................
320
Figure 201 Routing Table Status
.........................................................................................................
321
Figure 202 Configure Clone
................................................................................................................
323
Figure 203 no port-access-authenticator Command Example
............................................................
389
Figure 204 Pop-up Blocker
...................................................................................................................
416
Figure 205
Internet Options
.................................................................................................................
417
Figure 206 Internet Options
..................................................................................................................
418
Figure 207 Pop-up Blocker Settings
.....................................................................................................
418
Figure 208 Internet Options
..................................................................................................................
419
Figure 209 Security Settings - Java Scripting
.......................................................................................
420
Figure 210 Security Settings - Java
......................................................................................................
420