Table of Contents
MES-3728 User’s Guide
19
33.7 Backup a Configuration File
.........................................................................................
301
33.8 FTP Command Line
........................................................................................................
301
33.8.1 Filename Conventions
..........................................................................................
301
33.8.2 FTP Command Line Procedure
............................................................................
303
33.8.3 GUI-based FTP Clients
..........................................................................................
303
33.8.4 FTP Restrictions
....................................................................................................
304
Chapter
34
Access Control
......................................................................................................................
305
34.1 Access Control Overview
............................................................................................
305
34.2 The Access Control Main Screen
....................................................................................
305
34.3 About SNMP
..................................................................................................................
306
34.3.1 SNMP v3 and Security
...........................................................................................
307
34.3.2 Supported MIBs
....................................................................................................
307
34.3.3 SNMP Traps
..........................................................................................................
308
34.3.4 Configuring SNMP
................................................................................................
312
34.3.5 Configuring SNMP Trap Group
...........................................................................
314
34.3.6 Setting Up Login Accounts
.................................................................................
315
34.4 SSH Overview
.................................................................................................................
317
34.5 How SSH works
...............................................................................................................
318
34.6 SSH Implementation on the Switch
.................................................................................
319
34.6.1 Requirements for Using SSH
.................................................................................
319
34.7 Introduction to HTTPS
.....................................................................................................
319
34.8 HTTPS Example
..............................................................................................................
320
34.8.1 Internet Explorer Warning Messages
.....................................................................
320
34.8.2 Netscape Navigator Warning Messages
................................................................
321
34.8.3 The Main Screen
....................................................................................................
323
34.9 Service Port Access Control
.........................................................................................
323
34.10 Remote Management
...............................................................................................
324
Chapter
35
Diagnostic
..............................................................................................................................
327
35.1 Diagnostic
.......................................................................................................................
327
Chapter
36
Syslog
....................................................................................................................................
329
36.1 Syslog Overview
..............................................................................................................
329
36.2 Syslog Setup
..................................................................................................................
330
36.3 Syslog Server Setup
.......................................................................................................
331
Chapter
37
Cluster Management
.............................................................................................................
333
37.1 Cluster Management Status Overview
...........................................................................
333