Table of Contents
MES-3528 User’s Guide
19
33.6 SSH Implementation on the Switch ................................................................................. 299
33.6.1 Requirements for Using SSH ................................................................................. 299
33.7 Introduction to HTTPS .....................................................................................................299
33.8 HTTPS Example .............................................................................................................. 300
33.8.1 Internet Explorer Warning Messages ..................................................................... 300
33.8.2 Netscape Navigator Warning Messages ................................................................ 301
33.8.3 The Main Screen .................................................................................................... 303
33.9 Service Port Access Control ......................................................................................... 303
33.10 Remote Management ............................................................................................... 304
Chapter 34
Diagnostic..............................................................................................................................307
34.1 Diagnostic ....................................................................................................................... 307
Chapter 35
Syslog....................................................................................................................................309
35.1 Syslog Overview .............................................................................................................. 309
35.2 Syslog Setup .................................................................................................................. 310
35.3 Syslog Server Setup ........................................................................................................311
Chapter 36
Cluster Management.............................................................................................................313
36.1 Cluster Management Status Overview ........................................................................... 313
36.2 Cluster Management Status ........................................................................................... 314
36.2.1 Cluster Member Switch Management ................................................................... 315
36.3 Clustering Management Configuration .......................................................................... 318
Chapter 37
MAC Table..............................................................................................................................321
37.1 MAC Table Overview ...................................................................................................... 321
37.2 Viewing the MAC Table ................................................................................................... 322
Chapter 38
ARP Table ..............................................................................................................................325
38.1 ARP Table Overview .......................................................................................................325
38.1.1 How ARP Works .................................................................................................... 325
38.2 Viewing the ARP Table ................................................................................................... 326
Chapter 39
Configure Clone....................................................................................................................327
39.1 Configure Clone .............................................................................................................. 327