xviii
F
IGURES
Figure 3-1.
Homepage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Figure 3-2.
Panel Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Figure 3-3.
System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Figure 3-4.
Switch Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
Figure 3-5.
Bridge Extension Configuration . . . . . . . . . . . . . . . . . . . 3-17
Figure 3-6.
Manual IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Figure 3-7.
DHCP IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
Figure 3-8.
Operation Code Image File Transfer . . . . . . . . . . . . . . . 3-23
Figure 3-9.
Select Start-Up Operation File . . . . . . . . . . . . . . . . . . . . 3-23
Figure 3-10. Downloading Configuration Settings from a Server . . . 3-25
Figure 3-11. Selecting the Startup Configuration File . . . . . . . . . . . . 3-25
Figure 3-12. Resetting the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26
Figure 3-13. SNTP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Figure 3-14. Setting the Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
Figure 3-15. Setting Community Access Strings . . . . . . . . . . . . . . . . . 3-31
Figure 3-16. Specifying Trap Managers and Trap Types . . . . . . . . . . 3-32
Figure 3-17. Configuring the Logon Password . . . . . . . . . . . . . . . . . . 3-34
Figure 3-18. Setting Local, RADIUS and TACACS Authentication . 3-37
Figure 3-19. HTTPS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
Figure 3-20. SSH Host-Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 3-45
Figure 3-21. SSH Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-47
Figure 3-22. Configuring Port Security . . . . . . . . . . . . . . . . . . . . . . . . 3-50
Figure 3-23. 802.1x Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-53
Figure 3-24. 802.1x Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-56
Figure 3-25. 802.1x Port Configuration . . . . . . . . . . . . . . . . . . . . . . . 3-57
Figure 3-26. 802.1x Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-59
Figure 3-27. Naming and Choosing ACLs . . . . . . . . . . . . . . . . . . . . . 3-62
Figure 3-28. Configuring Standard IP ACLs . . . . . . . . . . . . . . . . . . . 3-63
Figure 3-29. Configuring Extended IP ACLs . . . . . . . . . . . . . . . . . . . 3-66
Figure 3-30. Configuring MAC ACLs . . . . . . . . . . . . . . . . . . . . . . . . . 3-69
Figure 3-31. Choosing ACL Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-71
Figure 3-32. Configuring an IP based ACL . . . . . . . . . . . . . . . . . . . . 3-73
Figure 3-33. Configuring a MAC based ACL . . . . . . . . . . . . . . . . . . . 3-75
Figure 3-34. Mapping ACLs to Port Ingress/Egress Queues . . . . . . 3-77
Figure 3-35. Filtering Management Access . . . . . . . . . . . . . . . . . . . . . 3-79
Figure 3-36. Port Status Information . . . . . . . . . . . . . . . . . . . . . . . . . 3-81
Содержание 8648T - annexe 1
Страница 2: ......
Страница 34: ...INTRODUCTION 1 10 ...
Страница 48: ...INITIAL CONFIGURATION 2 14 ...
Страница 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Страница 411: ...DNS COMMANDS 4 167 ...
Страница 536: ...COMMAND LINE INTERFACE 4 291 ...
Страница 542: ...TROUBLESHOOTING B 2 ...
Страница 555: ......