Chapter 26
Access Control...................................................................................................................... 179
26.3 About SNMP .................................................................................................................. 180
26.3.1 Supported MIBs ..................................................................................................... 181
26.3.2 SNMP Traps ........................................................................................................... 181
26.3.3 Configuring SNMP ................................................................................................. 182
26.5 SSH Overview ................................................................................................................. 184
26.6 How SSH works ............................................................................................................... 184
26.7.2 SSH Login Example ............................................................................................... 185
26.8 Introduction to HTTPS ..................................................................................................... 186
26.9 HTTPS Example .............................................................................................................. 187
26.9.3 The Main Screen .................................................................................................... 188
26.11 Remote Management ................................................................................................... 190
Diagnostic.............................................................................................................................. 191
27.1 Diagnostic ....................................................................................................................... 191
Syslog .................................................................................................................................... 193
28.1 Syslog Overview .............................................................................................................. 193
28.2 Syslog Setup .................................................................................................................. 193
28.3 Syslog Server Setup ....................................................................................................... 194
Chapter 29
Cluster Management............................................................................................................. 197
MAC Table.............................................................................................................................. 203
30.1 MAC Table Overview ..................................................................................................... 203
30.2 Viewing the MAC Table .................................................................................................... 204
VES-1616F-3x Series User's Guide
Table of Contents
15