ES-3124PWR Ethernet Switch
xvi Lists of Figures and Charts
Figure 8-2 Static MAC Forwarding: Summary Table ...............................................................................................................................8-2
Figure 9-1 Filtering.........................................................................................................................................................................................9-1
Figure 9-2 Filtering: Summary Table...........................................................................................................................................................9-2
Figure 10-1 Spanning Tree Protocol: Status.............................................................................................................................................10-3
Figure 10-2 Spanning Tree Protocol: Configuring..................................................................................................................................10-5
Figure 11-1 Bandwidth Control..................................................................................................................................................................11-1
Figure 12-1 Broadcast Storm Control........................................................................................................................................................12-2
Figure 13-1 Mirroring...................................................................................................................................................................................13-2
Figure 14-1 Aggregation ID.........................................................................................................................................................................14-2
Figure 14-2 Link Aggregation: Link Aggregation Protocol Status.......................................................................................................14-2
Figure 14-3 Link Aggregation: Configuration..........................................................................................................................................14-4
Figure 15-1 RADIUS Server.......................................................................................................................................................................15-1
Figure 15-2 Port Authentication..................................................................................................................................................................15-2
Figure 15-3 Port Authentication: RADIUS...............................................................................................................................................15-2
Figure 15-4 Port Authentication: 802.1x...................................................................................................................................................15-3
Figure 16-1 Port Security.............................................................................................................................................................................16-2
Figure 17-1 Access Control.........................................................................................................................................................................17-1
Figure 17-2 Console Port Priority...............................................................................................................................................................17-1
Figure 17-3 SNMP Management Model...................................................................................................................................................17-2
Figure 17-4 Access Control: SNMP...........................................................................................................................................................17-4
Figure 17-5 Access Control: Logins...........................................................................................................................................................17-5
Figure 17-6 SSH Communication Example..............................................................................................................................................17-6
Figure 17-7How SSH Works.......................................................................................................................................................................17-6
Figure 17-8 HTTPS Implementation .........................................................................................................................................................17-7
Figure 17-9 Security Alert Dialog Box (Internet Explorer) ...................................................................................................................17-8
Figure 17-10 Security Certificate 1 (Netscape)........................................................................................................................................17-9
Figure 17-11 Security Certificate 2 (Netscape)........................................................................................................................................17-9
Figure 17-12 Main Screen (Internet Explorer).......................................................................................................................................17-10
Figure 17-13 Main Screen (Netscape).....................................................................................................................................................17-10
Figure 17-14 Access Control: Service Access Control.........................................................................................................................17-11
Figure 17-15 Access Control: Remote Management.............................................................................................................................17-12
Figure 18-1 Queuing Method......................................................................................................................................................................18-2
Figure 19-1 Classifier...................................................................................................................................................................................19-2
Figure 19-2 Classifier: Summary Table.....................................................................................................................................................19-4
Figure 19-3 Classifier: Example .................................................................................................................................................................19-6
Figure 20-1 Policy.........................................................................................................................................................................................20-2
Figure 20-2 Policy: Summary Table ..........................................................................................................................................................20-4
Figure 20-3 Policy Example ........................................................................................................................................................................20-6
Figure 21-1 VLAN Stacking Example.......................................................................................................................................................21-2
Figure 21-2 VLAN Stacking .......................................................................................................................................................................21-4
Figure 22-1 DHCP Relay.............................................................................................................................................................................22-2
Figure 23-1 Static Routing...........................................................................................................................................................................23-1
Figure 23-2 Static Routing: Summary Table ............................................................................................................................................23-2
Figure 24-1 Maintenance.............................................................................................................................................................................24-1
Figure 24-2 Firmware Upgrade...................................................................................................................................................................24-1