Table of Contents
MGS-3712/MGS-3712F User’s Guide
19
33.7 Backup a Configuration File
.........................................................................................
301
33.8 FTP Command Line
........................................................................................................
301
33.8.1 Filename Conventions
..........................................................................................
301
33.8.2 FTP Command Line Procedure
............................................................................
302
33.8.3 GUI-based FTP Clients
..........................................................................................
303
33.8.4 FTP Restrictions
....................................................................................................
303
Chapter
34
Access Control
......................................................................................................................
305
34.1 Access Control Overview
............................................................................................
305
34.2 The Access Control Main Screen
....................................................................................
305
34.3 About SNMP
..................................................................................................................
306
34.3.1 SNMP v3 and Security
...........................................................................................
307
34.3.2 Supported MIBs
....................................................................................................
307
34.3.3 SNMP Traps
..........................................................................................................
308
34.3.4 Configuring SNMP
................................................................................................
315
34.3.5 Configuring SNMP Trap Group
...........................................................................
318
34.3.6 Setting Up Login Accounts
.................................................................................
319
34.4 SSH Overview
.................................................................................................................
320
34.5 How SSH works
...............................................................................................................
321
34.6 SSH Implementation on the Switch
.................................................................................
322
34.6.1 Requirements for Using SSH
.................................................................................
322
34.7 Introduction to HTTPS
.....................................................................................................
322
34.8 HTTPS Example
..............................................................................................................
323
34.8.1 Internet Explorer Warning Messages
.....................................................................
323
34.8.2 Netscape Navigator Warning Messages
................................................................
324
34.8.3 The Main Screen
....................................................................................................
326
34.9 Service Port Access Control
.........................................................................................
326
34.10 Remote Management
...............................................................................................
327
Chapter
35
Diagnostic
..............................................................................................................................
329
35.1 Diagnostic
.......................................................................................................................
329
Chapter
36
Syslog
....................................................................................................................................
331
36.1 Syslog Overview
..............................................................................................................
331
36.2 Syslog Setup
..................................................................................................................
332
36.3 Syslog Server Setup
.......................................................................................................
333
Chapter
37
Cluster Management
.............................................................................................................
335
37.1 Cluster Management Status Overview
...........................................................................
335