D-Link DGS-3200-10 Product Manual - Page 8
Appendix A - Mitigating ARP Spoofing Attacks Using Packet Content ACL, Appendix B - Switch Log Entries - gigabit ethernet switch
UPC - 790069306310
View all D-Link DGS-3200-10 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 8 highlights
xStack® DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch Save Log ...251 Save All...252 Download Configuration File/Download Configuration File to NV-RAM 252 Download Configuration File to SD Card...253 Download Firmware/Download Firmware to NV-RAM ...253 Download Firmware to SD Card...254 Upload Configuration File/Upload Configuration File to TFTP 254 Upload Log File/Upload Log File to TFTP...255 Reset...255 Reboot System ...256 Appendix A - Mitigating ARP Spoofing Attacks Using Packet Content ACL 257 Appendix B - Switch Log Entries...264 Appendix C - Trap Logs ...276 Appendix D - Password Recovery Procedure 279 Appendix E - Glossary ...280 Warranty ...282 viii
xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
viii
Save Log
....................................................................................................................................................................................
251
Save All
......................................................................................................................................................................................
252
Download Configuration File/Download Configuration File to NV-RAM
...............................................................................
252
Download Configuration File to SD Card
..................................................................................................................................
253
Download Firmware/Download Firmware to NV-RAM
...........................................................................................................
253
Download Firmware to SD Card
................................................................................................................................................
254
Upload Configuration File/Upload Configuration File to TFTP
................................................................................................
254
Upload Log File/Upload Log File to TFTP
................................................................................................................................
255
Reset
...........................................................................................................................................................................................
255
Reboot System
...........................................................................................................................................................................
256
Appendix A – Mitigating ARP Spoofing Attacks Using Packet Content ACL
......................................
257
Appendix B – Switch Log Entries
...............................................................................................................
264
Appendix C – Trap Logs
.............................................................................................................................
276
Appendix D – Password Recovery Procedure
...........................................................................................
279
Appendix E – Glossary
................................................................................................................................
280
Warranty
......................................................................................................................................................
282