xStackĀ® DGS-3620 Series Managed Switch Web UI Reference Guide
ix
Stacking Information
...................................................................................................................................................
449
Download Firmware
....................................................................................................................................................
451
Download Firmware from TFTP
..............................................................................................................................
451
Download Firmware from RCP
................................................................................................................................
451
Download Firmware from HTTP
..............................................................................................................................
452
Upload Firmware
.........................................................................................................................................................
452
Upload Firmware to TFTP
.......................................................................................................................................
452
Upload Firmware to RCP
.........................................................................................................................................
453
Upload Firmware to HTTP
.......................................................................................................................................
454
Download Configuration
..............................................................................................................................................
454
Download Configuration from TFTP
........................................................................................................................
454
Download Configuration from RCP
.........................................................................................................................
455
Download Configuration from HTTP
.......................................................................................................................
455
Upload Configuration
..................................................................................................................................................
456
Upload Configuration to TFTP
.................................................................................................................................
456
Upload Configuration to RCP
..................................................................................................................................
456
Upload Configuration to HTTP
................................................................................................................................
457
Upload Log File
...........................................................................................................................................................
458
Upload Log to TFTP
................................................................................................................................................
458
Upload Log to RCP
..................................................................................................................................................
458
Upload Log to HTTP
................................................................................................................................................
459
Reset
...........................................................................................................................................................................
459
Reboot System
............................................................................................................................................................
460
Appendices 461
Appendix A
Mitigating ARP Spoofing Attacks Using Packet Content ACL
............................................................
461
Appendix B
Password Recovery Procedure
..........................................................................................................
467
Appendix C
System Log Entries
.............................................................................................................................
468
Appendix D
Trap Entries
........................................................................................................................................
488