EasyManua.ls Logo

D-Link DES-3528 - xStack Switch - Stackable - Page 9

D-Link DES-3528 - xStack Switch - Stackable
367 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xStack® DES-3528/DES-3552 Series Layer 2 Stackable Fast Ethernet Managed Switch Web UI Reference Guide
viii
Ping Test ..................................................................................................................................................................... 328
Trace Route ................................................................................................................................................................. 329
Peripheral .................................................................................................................................................................... 331
Device Status........................................................................................................................................................... 331
Chapter 12 Save and Tools ...................................................................................................... 332
Save Configuration ID 1 .............................................................................................................................................. 332
Save Configuration ID 2 .............................................................................................................................................. 332
Save Log ..................................................................................................................................................................... 333
Save All ....................................................................................................................................................................... 333
Stacking Information ................................................................................................................................................... 333
Download Firmware .................................................................................................................................................... 335
Download Configuration File ....................................................................................................................................... 335
Upload Configuration File ............................................................................................................................................ 336
Upload Log File ........................................................................................................................................................... 337
Reset ........................................................................................................................................................................... 338
Reboot System ............................................................................................................................................................ 338
Appendix A Mitigating ARP Spoofing Attacks Using Packet Content ACL ................................ 339
How Address Resolution Protocol works .................................................................................................................... 339
How ARP Spoofing Attacks a Network ....................................................................................................................... 341
Prevent ARP Spoofing via Packet Content ACL ......................................................................................................... 342
Configuration ............................................................................................................................................................... 342
Appendix B System Log and Trap List ...................................................................................... 345
System Log Entries ..................................................................................................................................................... 345
DES-3528/DES-3552 Series Trap List ........................................................................................................................ 353
Proprietary Trap List .................................................................................................................................................... 353
Appendix C Password Recovery Procedure .............................................................................. 356
Appendix D Glossary ................................................................................................................. 357

Table of Contents

Related product manuals