xStackĀ® DGS-3120 Series Managed Switch Web UI Reference Guide
vii
Statistics
......................................................................................................................................................................
284
Port Statistics
...........................................................................................................................................................
284
Packet Size
..............................................................................................................................................................
292
Mirror
...........................................................................................................................................................................
294
Port Mirror Settings
..................................................................................................................................................
294
RSPAN Settings
......................................................................................................................................................
294
sFlow (EI Mode Only)
..................................................................................................................................................
296
sFlow Global Settings
..............................................................................................................................................
296
sFlow Analyzer Server Settings
..............................................................................................................................
296
sFlow Flow Sampler Settings
..................................................................................................................................
297
sFlow Counter Poller Settings
.................................................................................................................................
298
Ping Test
.....................................................................................................................................................................
299
Trace Route
.................................................................................................................................................................
300
Peripheral
....................................................................................................................................................................
302
Device Environment
................................................................................................................................................
302
Chapter 12
Save and Tools
.....................................................................................................
303
Save Configuration / Log
.............................................................................................................................................
303
Stacking Information
...................................................................................................................................................
303
Download firmware
.....................................................................................................................................................
305
Download Firmware From TFTP
.............................................................................................................................
305
Download Firmware From HTTP
.............................................................................................................................
305
Upload Firmware
.........................................................................................................................................................
306
Upload Firmware To TFTP
......................................................................................................................................
306
Download Configuration
..............................................................................................................................................
307
Download Configuration From TFTP
.......................................................................................................................
307
Download Configuration From HTTP
......................................................................................................................
308
Upload Configuration
..................................................................................................................................................
308
Upload Configuration To TFTP
................................................................................................................................
308
Upload Configuration To HTTP
...............................................................................................................................
309
Upload Log File
...........................................................................................................................................................
310
Upload Log To TFTP
...............................................................................................................................................
310
Upload Log To HTTP
...............................................................................................................................................
310
Reset
...........................................................................................................................................................................
311
Reboot System
............................................................................................................................................................
311
Appendix Section
........................................................................................................................
313
Appendix A
Mitigating ARP Spoofing Attacks Using Packet Content ACL
............................................................
313
How Address Resolution Protocol works
................................................................................................................
313
How ARP Spoofing Attacks a Network
....................................................................................................................
315
Prevent ARP Spoofing via Packet Content ACL
.....................................................................................................
316
Configuration
...........................................................................................................................................................
316
Appendix B
Password Recovery Procedure
..........................................................................................................
319
Appendix C
System Log Entries
.............................................................................................................................
320
Appendix D
Trap Log Entries
.................................................................................................................................
330