GS-4012F User’s Guide
14 Table of Contents
32.6.1 Requirements for Using SSH ............................................................... 195
32.7 Introduction to HTTPS ................................................................................... 195
32.8 HTTPS Example ............................................................................................ 196
32.8.1 Internet Explorer Warning Messages ................................................... 196
32.8.2 Netscape Navigator Warning Messages .............................................. 197
32.8.3 The Main Screen .................................................................................. 198
32.9 Service Port Access Control ........................................................................ 200
32.10 Remote Management ................................................................................ 200
Chapter 33
Diagnostic............................................................................................................. 203
33.1 Diagnostic ..................................................................................................... 203
Chapter 34
Cluster Management............................................................................................ 205
34.1 Overview ........................................................................................................ 205
34.2 Cluster Management Status ......................................................................... 206
34.2.1 Cluster Member Switch Management ................................................. 207
34.2.1.1 Uploading Firmware to a Cluster Member Switch .................... 207
34.3 Configuring Cluster Management ................................................................. 208
Chapter 35
MAC Table..............................................................................................................211
35.1 Overview ........................................................................................................ 211
35.2 Viewing the MAC Table ................................................................................. 212
Chapter 36
IP Table ................................................................................................................. 213
36.1 Overview ........................................................................................................ 213
36.2 Viewing the IP Table ..................................................................................... 214
Chapter 37
ARP Table ............................................................................................................. 215
37.1 Overview ........................................................................................................ 215
37.1.1 How ARP Works .................................................................................. 215
37.2 Viewing the ARP Table ................................................................................. 215
Chapter 38
Routing Table ....................................................................................................... 217
38.1 Overview ........................................................................................................ 217
38.2 Viewing the Routing Table ............................................................................ 217