
ES-2048 User’s Guide
List of Figures 21
Figure 82 SNMP Management Model .................................................................. 178
Figure 83 Access Control: SNMP ......................................................................... 180
Figure 84 Access Control: Logins ......................................................................... 181
Figure 85 SSH Communication Example ............................................................... 182
Figure 86 How SSH Works .................................................................................... 183
Figure 87 HTTPS Implementation .......................................................................... 184
Figure 88 Security Alert Dialog Box (Internet Explorer) ......................................... 185
Figure 89 Security Certificate 1 (Netscape) ........................................................... 186
Figure 90 Security Certificate 2 (Netscape) ........................................................... 186
Figure 91 Example: Lock Denoting a Secure Connection ..................................... 187
Figure 92 Access Control: Service Access Control ............................................... 188
Figure 93 Access Control: Remote Management ................................................. 189
Figure 94 Diagnostic ............................................................................................. 191
Figure 95 Syslog ................................................................................................... 194
Figure 96 Syslog: Server Setup ............................................................................ 195
Figure 97 Clustering Application Example ............................................................ 198
Figure 98 Clustering Management: Status ............................................................ 199
Figure 99 Cluster Management: Cluster Member Web Configurator Screen ........ 200
Figure 100 Example: Uploading Firmware to a Cluster Member Switch ............... 201
Figure 101 Clustering Management Configuration .............................................. 202
Figure 102 MAC Table Flowchart .......................................................................... 205
Figure 103 MAC Table .......................................................................................... 206
Figure 104 ARP Table ........................................................................................... 208
Figure 105 Configure Clone .................................................................................. 209
Figure 106 no port-access-authenticator Command Example .............................. 255
Figure 107 Pop-up Blocker .................................................................................... 282
Figure 108 Internet Options .................................................................................. 283
Figure 109 Internet Options ................................................................................... 284
Figure 110 Pop-up Blocker Settings ....................................................................... 285
Figure 111 Internet Options .................................................................................... 286
Figure 112 Security Settings - Java Scripting ........................................................ 287
Figure 113 Security Settings - Java ....................................................................... 288
Figure 114 Java (Sun) ............................................................................................ 289