xStack
® 
DGS-3120 Series Managed Switch CLI Reference Guide 
III 
 
Chapter 71  Simple Mail Transfer Protocol (SMTP) Command List ..................................................... 642 
Chapter 72  Simple Network Management Protocol (SNMP) Command List ...................................... 647 
Chapter 73  Single IP Management Command List ............................................................................. 673 
Chapter 74  Stacking Command List .................................................................................................... 683 
Chapter 75  Syslog and Trap Source-interface Command List ............................................................ 691 
Chapter 76  System Log Command List ............................................................................................... 695 
Chapter 77  System Severity Command List ........................................................................................ 707 
Chapter 78  Telnet Client Command List .............................................................................................. 709 
Chapter 79  TFTP Client Command List ............................................................................................... 710 
Chapter 80  Time and SNTP Command List ........................................................................................ 715 
Chapter 81  Trace Route Command List .............................................................................................. 722 
Chapter 82  Traffic Control Command List ........................................................................................... 725 
Chapter 83  Traffic Segmentation Command List ................................................................................. 730 
Chapter 84  Trusted Host Command List ............................................................................................. 732 
Chapter 85  Unicast Routing Command List ......................................................................................... 736 
Chapter 86  VLAN Trunking Command List .......................................................................................... 741 
Chapter 87  Voice VLAN Command List ............................................................................................... 746 
Chapter 88  Web-Based Access Control (WAC) Command List .......................................................... 757 
Chapter 89  Password Recovery Command List .................................................................................. 772 
Appendix A  Mitigating ARP Spoofing Attacks Using Packet Content ACL .......................................... 774 
Appendix B  Password Recovery Procedure ......................................................................................... 781 
Appendix C  System Log Entries ........................................................................................................... 783 
Appendix D  Trap Log Entries ................................................................................................................ 798 
Appendix E  RADIUS Attributes Assignment ......................................................................................... 806