D-Link DGS-3120-24PC-EI Product Manual - Page 8

Save and Tools, Appendix Mitigating ARP Spoofing Attacks Using Packet Content ACL - systems

Page 8 highlights

xStack® DGS-3120 Series Managed Switch Web UI Reference Guide Statistics ...284 Port Statistics...284 Packet Size...292 Mirror ...294 Port Mirror Settings...294 RSPAN Settings ...294 sFlow (EI Mode Only)...296 sFlow Global Settings...296 sFlow Analyzer Server Settings ...296 sFlow Flow Sampler Settings ...297 sFlow Counter Poller Settings ...298 Ping Test ...299 Trace Route...300 Peripheral ...302 Device Environment ...302 Chapter 12 Save and Tools...303 Save Configuration / Log...303 Stacking Information ...303 Download firmware ...305 Download Firmware From TFTP ...305 Download Firmware From HTTP...305 Upload Firmware ...306 Upload Firmware To TFTP ...306 Download Configuration...307 Download Configuration From TFTP...307 Download Configuration From HTTP ...308 Upload Configuration ...308 Upload Configuration To TFTP...308 Upload Configuration To HTTP ...309 Upload Log File ...310 Upload Log To TFTP ...310 Upload Log To HTTP...310 Reset ...311 Reboot System...311 Appendix Section...313 Appendix A Mitigating ARP Spoofing Attacks Using Packet Content ACL 313 How Address Resolution Protocol works ...313 How ARP Spoofing Attacks a Network...315 Prevent ARP Spoofing via Packet Content ACL ...316 Configuration ...316 Appendix B Password Recovery Procedure ...319 Appendix C System Log Entries...320 Appendix D Trap Log Entries ...330 vii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339

xStackĀ® DGS-3120 Series Managed Switch Web UI Reference Guide
vii
Statistics
......................................................................................................................................................................
284
Port Statistics
...........................................................................................................................................................
284
Packet Size
..............................................................................................................................................................
292
Mirror
...........................................................................................................................................................................
294
Port Mirror Settings
..................................................................................................................................................
294
RSPAN Settings
......................................................................................................................................................
294
sFlow (EI Mode Only)
..................................................................................................................................................
296
sFlow Global Settings
..............................................................................................................................................
296
sFlow Analyzer Server Settings
..............................................................................................................................
296
sFlow Flow Sampler Settings
..................................................................................................................................
297
sFlow Counter Poller Settings
.................................................................................................................................
298
Ping Test
.....................................................................................................................................................................
299
Trace Route
.................................................................................................................................................................
300
Peripheral
....................................................................................................................................................................
302
Device Environment
................................................................................................................................................
302
Chapter 12
Save and Tools
.....................................................................................................
303
Save Configuration / Log
.............................................................................................................................................
303
Stacking Information
...................................................................................................................................................
303
Download firmware
.....................................................................................................................................................
305
Download Firmware From TFTP
.............................................................................................................................
305
Download Firmware From HTTP
.............................................................................................................................
305
Upload Firmware
.........................................................................................................................................................
306
Upload Firmware To TFTP
......................................................................................................................................
306
Download Configuration
..............................................................................................................................................
307
Download Configuration From TFTP
.......................................................................................................................
307
Download Configuration From HTTP
......................................................................................................................
308
Upload Configuration
..................................................................................................................................................
308
Upload Configuration To TFTP
................................................................................................................................
308
Upload Configuration To HTTP
...............................................................................................................................
309
Upload Log File
...........................................................................................................................................................
310
Upload Log To TFTP
...............................................................................................................................................
310
Upload Log To HTTP
...............................................................................................................................................
310
Reset
...........................................................................................................................................................................
311
Reboot System
............................................................................................................................................................
311
Appendix Section
........................................................................................................................
313
Appendix A
Mitigating ARP Spoofing Attacks Using Packet Content ACL
............................................................
313
How Address Resolution Protocol works
................................................................................................................
313
How ARP Spoofing Attacks a Network
....................................................................................................................
315
Prevent ARP Spoofing via Packet Content ACL
.....................................................................................................
316
Configuration
...........................................................................................................................................................
316
Appendix B
Password Recovery Procedure
..........................................................................................................
319
Appendix C
System Log Entries
.............................................................................................................................
320
Appendix D
Trap Log Entries
.................................................................................................................................
330