xStackĀ® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
viii
Ping Test
.....................................................................................................................................................................
328
Trace Route
.................................................................................................................................................................
329
Peripheral
....................................................................................................................................................................
331
Device Status
...........................................................................................................................................................
331
Chapter 12
Save and Tools
......................................................................................................
332
Save Configuration ID 1
..............................................................................................................................................
332
Save Configuration ID 2
..............................................................................................................................................
332
Save Log
.....................................................................................................................................................................
333
Save All
.......................................................................................................................................................................
333
Stacking Information
...................................................................................................................................................
333
Download Firmware
....................................................................................................................................................
335
Download Configuration File
.......................................................................................................................................
335
Upload Configuration File
............................................................................................................................................
336
Upload Log File
...........................................................................................................................................................
337
Reset
...........................................................................................................................................................................
338
Reboot System
............................................................................................................................................................
338
Appendix A
Mitigating ARP Spoofing Attacks Using Packet Content ACL
................................
339
How Address Resolution Protocol works
....................................................................................................................
339
How ARP Spoofing Attacks a Network
.......................................................................................................................
341
Prevent ARP Spoofing via Packet Content ACL
.........................................................................................................
342
Configuration
...............................................................................................................................................................
342
Appendix B
System Log and Trap List
......................................................................................
345
System Log Entries
.....................................................................................................................................................
345
DES-3528/DES-3552 Series Trap List
........................................................................................................................
353
Proprietary Trap List
....................................................................................................................................................
353
Appendix C
Password Recovery Procedure
..............................................................................
356
Appendix D
Glossary
.................................................................................................................
357