39
3.2 Management Access Overview
The
Managed Switch
gives you the flexibility to access and manage it using any or all of the following methods:
Remote
Telnet
Interface
Web browser
Interface
An
external
SNMP-based network management application
The Remote Telnet and Web browser interface support are embedded in the
Managed Switch
software and are available for
immediate use. Each of these management methods has their own advantages. Table 3-1 compares the three management
methods.
Method
Advantages
Disadvantages
Remote
Telnet
Text-based
Telnet functionality built into Windows
XP/2003, Vista, Windows 7 operating
systems
Can be accesses from any location
Security can be compromised (hackers need
only know the IP address)
Web Browser
Ideal for configuring the switch remotely
Compatible with all popular browsers
Can be accessed from any location
Most visually appealing
Security can be compromised (hackers need
only know the IP address and subnet mask)
May encounter lag times on poor connections
SNMP Agent
Communicates with switch functions at
the MIB level
Based on open standards
Requires SNMP manager software
Least visually appealing of all three methods
Some settings require calculations
Security can be compromised (hackers need
only know the community name)
Table 3-1:
Comparison of Management Methods
Summary of Contents for NS4750-24S-4T-4X
Page 1: ...NS4750 24S 4T 4X User Manual P N 1702826 REV 00 01 ISS 14JUL14 ...
Page 56: ...56 Figure 4 2 7 Privilege Levels Configuration Page Screenshot ...
Page 110: ...110 Figure 4 4 6 Mirror Configuration Page Screenshot ...
Page 117: ...117 Figure 4 5 4 LACP Port Configuration Page Screenshot ...
Page 174: ...174 Figure 4 7 10 MST1 MSTI Port Configuration Page Screenshot ...
Page 180: ...180 Figure 4 8 2 Multicast Flooding ...
Page 249: ...249 Figure 4 9 18 Voice VLAN Configuration Page Screenshot ...
Page 271: ...271 Counter Counts the number of frames that match this ACE ...
Page 281: ...281 Figure 4 11 4 Network Access Server Configuration Page Screenshot ...
Page 315: ...315 ...
Page 328: ...328 ...
Page 335: ...335 ...
Page 346: ...346 Figure 4 14 1 LLDP Configuration Page Screenshot ...
Page 350: ...350 Figure 4 14 2 LLDP MED Configuration Page Screenshot ...
Page 372: ...372 Figure 4 16 1 Loop Protection Configuration Page Screenshot ...