xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
viii
Ping Test ..................................................................................................................................................................... 328
Trace Route ................................................................................................................................................................. 329
Peripheral .................................................................................................................................................................... 331
Device Status........................................................................................................................................................... 331
Chapter 12 Save and Tools ...................................................................................................... 332
Save Configuration ID 1 .............................................................................................................................................. 332
Save Configuration ID 2 .............................................................................................................................................. 332
Save Log ..................................................................................................................................................................... 333
Save All ....................................................................................................................................................................... 333
Stacking Information ................................................................................................................................................... 333
Download Firmware .................................................................................................................................................... 335
Download Configuration File ....................................................................................................................................... 335
Upload Configuration File ............................................................................................................................................ 336
Upload Log File ........................................................................................................................................................... 337
Reset ........................................................................................................................................................................... 338
Reboot System ............................................................................................................................................................ 338
Appendix A Mitigating ARP Spoofing Attacks Using Packet Content ACL ................................ 339
How Address Resolution Protocol works .................................................................................................................... 339
How ARP Spoofing Attacks a Network ....................................................................................................................... 341
Prevent ARP Spoofing via Packet Content ACL ......................................................................................................... 342
Configuration ............................................................................................................................................................... 342
Appendix B System Log and Trap List ...................................................................................... 345
System Log Entries ..................................................................................................................................................... 345
DES-3528/DES-3552 Series Trap List ........................................................................................................................ 353
Proprietary Trap List .................................................................................................................................................... 353
Appendix C Password Recovery Procedure .............................................................................. 356
Appendix D Glossary ................................................................................................................. 357