32.3 About SNMP .................................................................................................................. 262
32.3.3 SNMP Traps .......................................................................................................... 263
32.4 SSH Overview ................................................................................................................. 271
32.5 How SSH works ............................................................................................................... 271
32.7 Introduction to HTTPS ..................................................................................................... 272
32.8 HTTPS Example .............................................................................................................. 273
32.8.3 The Main Screen .................................................................................................... 274
Diagnostic.............................................................................................................................. 279
33.1 Diagnostic ....................................................................................................................... 279
Syslog .................................................................................................................................... 281
34.1 Syslog Overview .............................................................................................................. 281
34.2 Syslog Setup .................................................................................................................. 281
34.3 Syslog Server Setup ....................................................................................................... 282
Cluster Management............................................................................................................. 285
MAC Table.............................................................................................................................. 291
36.1 MAC Table Overview ...................................................................................................... 291
36.2 Viewing the MAC Table ................................................................................................... 292
IP Table .................................................................................................................................. 293
GS-2750 User's Guide
................................................................................................... 263
.............................................................................................. 266
........................................................................... 268
................................................................................. 269
......................................................................................... 275
............................................................................................... 276
Table of Contents
19