Table of Contents
ES3500 Series User’s Guide
14
Chapter 39Access Control ..................................................................................................................... 292
39.1 Access Control Overview .............................................................................................292
39.2 The Access Control Main Screen .....................................................................................292
39.3 About SNMP ...................................................................................................................292
39.3.1 SNMP v3 and Security ...........................................................................................293
39.3.2 Supported MIBs .....................................................................................................294
39.3.3 SNMP Traps ...........................................................................................................294
39.3.4 Configuring SNMP .................................................................................................301
39.3.5 Configuring SNMP Trap Group ............................................................................302
39.3.6 Configuring SNMP User ......................................................................................303
39.4 Setting Up Login Accounts ...........................................................................................305
39.5 SSH Overview ..................................................................................................................306
39.6 How SSH works ...............................................................................................................307
39.7 SSH Implementation on the Switch ..................................................................................308
39.7.1 Requirements for Using SSH ..................................................................................308
39.8 Introduction to HTTPS ......................................................................................................308
39.9 HTTPS Example ..............................................................................................................309
39.9.1 Internet Explorer Warning Messages .....................................................................309
39.9.2 Mozilla Firefox Warning Messages .........................................................................312
39.9.3 The Main Screen ....................................................................................................313
39.10 Service Port Access Control .......................................................................................314
39.11 Remote Management ................................................................................................315
Chapter 40Diagnostic ............................................................................................................................. 317
40.1 Diagnostic .......................................................................................................................317
Chapter 41Syslog .................................................................................................................................... 318
41.1 Syslog Overview ..............................................................................................................318
41.2 Syslog Setup ...................................................................................................................319
41.3 Syslog Server Setup .......................................................................................................320
Chapter 42Cluster Management ............................................................................................................ 321
42.1 Cluster Management Status Overview ............................................................................321
42.2 Cluster Management Status ............................................................................................322
42.2.1 Cluster Member Switch Management ...................................................................323
42.3 Clustering Management Configuration ............................................................................325
Chapter 43MAC Table ............................................................................................................................. 327