List of Figures
ES-2024 Series User’s Guide
24
Figure 125 Management > Maintenance > Backup Configuration ...................................................... 206
Figure 126 Management > Access Control ......................................................................................... 209
Figure 127 SNMP Management Model .............................................................................................. 210
Figure 128 Management > Access Control > SNMP ........................................................................... 215
Figure 129 Management > Access Control > SNMP > Trap Group .................................................... 217
Figure 130 Management > Access Control > Logins .......................................................................... 218
Figure 131 SSH Communication Example ...........................................................................................219
Figure 132 How SSH Works ................................................................................................................. 219
Figure 133 HTTPS Implementation ...................................................................................................... 221
Figure 134 Security Alert Dialog Box (Internet Explorer) ...................................................................... 221
Figure 135 Security Certificate 1 (Netscape) ........................................................................................ 222
Figure 136 Security Certificate 2 (Netscape) ........................................................................................ 222
Figure 137 Example: Lock Denoting a Secure Connection .................................................................. 223
Figure 138 Management > Access Control > Service Access Control ................................................. 223
Figure 139 Management > Access Control > Remote Management .................................................. 224
Figure 140 Management > Diagnostic ................................................................................................. 227
Figure 141 Management > Syslog ....................................................................................................... 230
Figure 142 Management > Syslog > Server Setup ............................................................................. 231
Figure 143 Clustering Application Example ......................................................................................... 234
Figure 144 Management > Cluster Management ................................................................................ 234
Figure 145 Cluster Management: Cluster Member Web Configurator Screen .................................... 235
Figure 146 Example: Uploading Firmware to a Cluster Member Switch ............................................. 236
Figure 147 Management > Clustering Management > Configuration .................................................. 237
Figure 148 MAC Table Flowchart ........................................................................................................ 239
Figure 149 Management > MAC Table ................................................................................................ 240
Figure 150 Management > ARP Table ................................................................................................ 244
Figure 151 Management > Configure Clone .......................................................................................245
Figure 152 DC Power Plug ................................................................................................................... 249
Figure 153 Network Number and Host ID ............................................................................................ 258
Figure 154 Subnetting Example: Before Subnetting ............................................................................ 260
Figure 155 Subnetting Example: After Subnetting ............................................................................... 261