
ES-3148 User’s Guide
Table of Contents 17
Chapter 27
Access Control..................................................................................................... 195
27.1 Access Control Overview ...........................................................................195
27.2 The Access Control Main Screen ...................................................................195
27.3 About SNMP .................................................................................................196
27.3.1 Supported MIBs ..................................................................................197
27.3.2 SNMP Traps .......................................................................................197
27.3.3 Configuring SNMP ...............................................................................198
27.3.4 Setting Up Login Accounts ................................................................198
27.4 SSH Overview ................................................................................................200
27.5 How SSH works .............................................................................................200
27.6 SSH Implementation on the Switch ................................................................201
27.6.1 Requirements for Using SSH ................................................................202
27.7 Introduction to HTTPS ....................................................................................202
27.8 HTTPS Example ............................................................................................203
27.8.1 Internet Explorer Warning Messages ...................................................203
27.8.2 Netscape Navigator Warning Messages ...............................................203
27.8.3 The Main Screen ..................................................................................204
27.9 Service Port Access Control .......................................................................205
27.10 Remote Management ..............................................................................206
Chapter 28
Diagnostic............................................................................................................. 209
28.1 Diagnostic .....................................................................................................209
Chapter 29
Syslog ................................................................................................................... 211
29.1 Syslog Overview ............................................................................................211
29.2 Syslog Setup .................................................................................................211
29.3 Syslog Server Setup .....................................................................................212
Chapter 30
Cluster Management............................................................................................ 215
30.1 Cluster Management Status Overview ..........................................................215
30.2 Cluster Management Status ..........................................................................216
30.2.1 Cluster Member Switch Management ..................................................217
30.2.1.1 Uploading Firmware to a Cluster Member Switch .....................218
30.3 Clustering Management Configuration ..........................................................219
Chapter 31
MAC Table............................................................................................................. 223
31.1 MAC Table Overview .....................................................................................223
31.2 Viewing the MAC Table .................................................................................224