Table of Contents
GS2200 Series User’s Guide
13
34.5 Backup a Configuration File .......................................................................................................252
34.6 Technical Reference ......................................................................................................................253
34.6.1 FTP Command Line ............................................................................................................253
34.6.2 Filename Conventions ........................................................................................................253
34.6.3 FTP Command Line Procedure ..........................................................................................253
34.6.4 GUI-based FTP Clients ........................................................................................................254
34.6.5 FTP Restrictions .................................................................................................................254
Chapter 35
Access Control .................................................................................................................................255
35.1 Overview .......................................................................................................................................255
35.1.1 What You Can Do ................................................................................................................255
35.2 The Access Control Main Screen ..................................................................................................255
35.3 Configuring SNMP .....................................................................................................................256
35.3.1 Configuring SNMP Trap Group .........................................................................................258
35.3.2 Configuring SNMP User ...................................................................................................259
35.4 Setting Up Login Accounts .......................................................................................................260
35.5 Service Port Access Control ..................................................................................................262
35.6 Remote Management ..............................................................................................................262
35.7 Technical Reference ......................................................................................................................264
35.7.1 About SNMP .......................................................................................................................264
35.7.2 SSH Overview .....................................................................................................................271
35.7.3 Introduction to HTTPS .........................................................................................................272
Chapter 36
Diagnostic .........................................................................................................................................279
36.1 Overview .......................................................................................................................................279
36.2 Diagnostic ....................................................................................................................................279
Chapter 37
Syslog................................................................................................................................................281
37.1 Overview .......................................................................................................................................281
37.1.1 What You Can Do ................................................................................................................281
37.2 Syslog Setup ................................................................................................................................281
37.3 Syslog Server Setup ....................................................................................................................283
Chapter 38
Cluster Management ........................................................................................................................284
38.1 Overview .......................................................................................................................................284
38.1.1 What You Can Do ................................................................................................................285
38.2 Cluster Management Status .......................................................................................................285
38.3 Clustering Management Configuration ........................................................................................286
38.4 Technical Reference ......................................................................................................................288