
Table of Contents
VES-1616F-3x Series User’s Guide
15
Chapter 26
Access Control...................................................................................................................... 179
26.1 Access Control Overview ................................................................................................ 179
26.2 The Access Control Main Screen .................................................................................... 179
26.3 About SNMP .................................................................................................................. 180
26.3.1 Supported MIBs ..................................................................................................... 181
26.3.2 SNMP Traps ........................................................................................................... 181
26.3.3 Configuring SNMP ................................................................................................. 182
26.4 Setting Up Login Accounts ............................................................................................. 182
26.5 SSH Overview ................................................................................................................. 184
26.6 How SSH works ............................................................................................................... 184
26.7 SSH Implementation on the Switch ................................................................................. 185
26.7.1 Requirements for Using SSH ................................................................................. 185
26.7.2 SSH Login Example ............................................................................................... 185
26.8 Introduction to HTTPS .....................................................................................................186
26.9 HTTPS Example .............................................................................................................. 187
26.9.1 Internet Explorer Warning Messages ..................................................................... 187
26.9.2 Netscape Navigator Warning Messages ................................................................ 188
26.9.3 The Main Screen .................................................................................................... 188
26.10 Service Access Control ................................................................................................ 189
26.11 Remote Management ................................................................................................... 190
Chapter 27
Diagnostic.............................................................................................................................. 191
27.1 Diagnostic ....................................................................................................................... 191
Chapter 28
Syslog .................................................................................................................................... 193
28.1 Syslog Overview .............................................................................................................. 193
28.2 Syslog Setup .................................................................................................................. 193
28.3 Syslog Server Setup ....................................................................................................... 194
Chapter 29
Cluster Management.............................................................................................................197
29.1 Cluster Management Overview ...................................................................................... 197
29.2 Cluster Management Status ............................................................................................ 198
29.2.1 Cluster Member Switch Management .................................................................... 199
29.3 Configuring Cluster Management ................................................................................... 200
Chapter 30
MAC Table.............................................................................................................................. 203
30.1 MAC Table Overview ..................................................................................................... 203
30.2 Viewing the MAC Table .................................................................................................... 204