Using Monitor ................................................................................................................................... 3-75
Monitor by Switch ...................................................................................................................... 3-76
Monitor by Port ......................................................................................................................... 3-76
Monitor by SFP .......................................................................................................................... 3-77
Monitor by DSL Port (D1) (IEX series only) ................................................................................... 3-77
Using the MAC Address Table ............................................................................................................. 3-78
Using Access Control List ................................................................................................................... 3-78
The ACL Concept ....................................................................................................................... 3-79
Access Control List Configuration and Setup ................................................................................. 3-80
Using Event Log ............................................................................................................................... 3-83
Using Syslog .................................................................................................................................... 3-83
Using HTTPS/SSL .............................................................................................................................. 3-84
4. EDS Configurator GUI ........................................................................................................................ 4-1
Starting EDS Configurator .................................................................................................................... 4-2
Broadcast Search ................................................................................................................................ 4-2
Search by IP Address .......................................................................................................................... 4-3
Upgrade Firmware .............................................................................................................................. 4-3
Modify IP Address ............................................................................................................................... 4-4
Export Configuration ........................................................................................................................... 4-4
Import Configuration ........................................................................................................................... 4-5
Unlock Server .................................................................................................................................... 4-6
A. MIB Groups ....................................................................................................................................... A-1