ES-4124 User’s Guide
24
List of Figures
Figure 125 Firmware Upgrade ............................................................................. 217
Figure 126 Restore Configuration ......................................................................... 218
Figure 127 Backup Configuration .......................................................................... 218
Figure 128 Access Control .................................................................................... 221
Figure 129 SNMP Management Model ................................................................ 222
Figure 130 Access Control: SNMP ....................................................................... 224
Figure 131 Access Control: Logins ....................................................................... 225
Figure 132 SSH Communication Example ............................................................. 226
Figure 133 How SSH Works .................................................................................. 227
Figure 134 HTTPS Implementation ........................................................................ 228
Figure 135 Security Alert Dialog Box (Internet Explorer) ....................................... 229
Figure 136 Security Certificate 1 (Netscape) ......................................................... 230
Figure 137 Security Certificate 2 (Netscape) ......................................................... 230
Figure 138 Example: Lock Denoting a Secure Connection ................................... 231
Figure 139 Access Control: Service Access Control ............................................. 232
Figure 140 Access Control: Remote Management ............................................... 233
Figure 141 Diagnostic ........................................................................................... 235
Figure 142 Syslog ................................................................................................. 238
Figure 143 Syslog: Server Setup .......................................................................... 239
Figure 144 Clustering Application Example .......................................................... 242
Figure 145 Cluster Management: Status ............................................................... 243
Figure 146 Cluster Management: Cluster Member Web Configurator Screen ...... 244
Figure 147 Example: Uploading Firmware to a Cluster Member Switch ............... 245
Figure 148 Clustering Management Configuration .............................................. 246
Figure 149 MAC Table Flowchart .......................................................................... 249
Figure 150 MAC Table .......................................................................................... 250
Figure 151 IP Table Flowchart .............................................................................. 251
Figure 152 IP Table ............................................................................................... 252
Figure 153 ARP Table ........................................................................................... 254
Figure 154 Routing Table Status ........................................................................... 255
Figure 155 Configure Clone .................................................................................. 257
Figure 156 no port-access-authenticator Command Example .............................. 311
Figure 157 Pop-up Blocker .................................................................................... 340
Figure 158 Internet Options .................................................................................. 341
Figure 159 Internet Options ................................................................................... 342
Figure 160 Pop-up Blocker Settings ...................................................................... 343
Figure 161 Internet Options ................................................................................... 344
Figure 162 Security Settings - Java Scripting ........................................................ 345
Figure 163 Security Settings - Java ....................................................................... 346
Figure 164 Java (Sun) ............................................................................................ 347
Summary of Contents for Dimension ES-4124
Page 1: ...ES 4124 Intelligent Layer 3 Switch User s Guide Version 3 70 8 2006...
Page 2: ......
Page 7: ...ES 4124 User s Guide Safety Warnings 5 This product is recyclable Dispose of it properly...
Page 36: ...ES 4124 User s Guide 34 Chapter 1 Getting to Know Your Switch...
Page 40: ...ES 4124 User s Guide 38 Chapter 2 Hardware Installation and Connection...
Page 48: ...ES 4124 User s Guide 46 Chapter 3 Hardware Overview...
Page 58: ...ES 4124 User s Guide 56 Chapter 4 The Web Configurator...
Page 64: ...ES 4124 User s Guide 62 Chapter 5 Initial Setup Example...
Page 70: ...ES 4124 User s Guide 68 Chapter 6 System Status and Port Statistics...
Page 82: ...ES 4124 User s Guide 80 Chapter 7 Basic Setting...
Page 95: ...ES 4124 User s Guide Chapter 8 VLAN 93 Figure 39 Port Based VLAN Setup All Connected...
Page 96: ...ES 4124 User s Guide 94 Chapter 8 VLAN Figure 40 Port Based VLAN Setup Port Isolation...
Page 98: ...ES 4124 User s Guide 96 Chapter 8 VLAN...
Page 107: ...ES 4124 User s Guide Chapter 11 Spanning Tree Protocol 105 Figure 45 RSTP Configuration...
Page 114: ...ES 4124 User s Guide 112 Chapter 11 Spanning Tree Protocol...
Page 126: ...ES 4124 User s Guide 124 Chapter 15 Link Aggregation...
Page 132: ...ES 4124 User s Guide 130 Chapter 16 Port Authentication...
Page 136: ...ES 4124 User s Guide 134 Chapter 17 Port Security...
Page 142: ...ES 4124 User s Guide 140 Chapter 18 Classifier Figure 61 Classifier Example...
Page 149: ...ES 4124 User s Guide Chapter 19 Policy Rule 147 Figure 64 Policy Example...
Page 150: ...ES 4124 User s Guide 148 Chapter 19 Policy Rule...
Page 153: ...ES 4124 User s Guide Chapter 20 Queuing Method 151 Figure 65 Queuing Method...
Page 160: ...ES 4124 User s Guide 158 Chapter 21 VLAN Stacking...
Page 236: ...ES 4124 User s Guide 234 Chapter 33 Access Control...
Page 238: ...ES 4124 User s Guide 236 Chapter 34 Diagnostic...
Page 242: ...ES 4124 User s Guide 240 Chapter 35 Syslog...
Page 250: ...ES 4124 User s Guide 248 Chapter 36 Cluster Management...
Page 258: ...ES 4124 User s Guide 256 Chapter 40 Routing Table...
Page 306: ...ES 4124 User s Guide 304 Chapter 43 User and Enable Mode Commands...
Page 320: ...ES 4124 User s Guide 318 Chapter 44 Configuration Mode Commands...
Page 336: ...ES 4124 User s Guide 334 Chapter 46 IEEE 802 1Q Tagged VLAN Commands...
Page 340: ...ES 4124 User s Guide 338 Chapter 48 Routing Domain Command Examples...
Page 350: ...ES 4124 User s Guide 348 Chapter 49 Troubleshooting...
Page 356: ...ES 4124 User s Guide 354 Appendix A Product Specifications...