EasyManua.ls Logo

D-Link DGS-3620-28PC-SI - Port Configuration; Port Settings

D-Link DGS-3620-28PC-SI
502 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
xStack® DGS-3620 Series Managed Switch Web UI Reference Guide
ix
Stacking Information ................................................................................................................................................... 449
Download Firmware .................................................................................................................................................... 451
Download Firmware from TFTP .............................................................................................................................. 451
Download Firmware from RCP ................................................................................................................................ 451
Download Firmware from HTTP .............................................................................................................................. 452
Upload Firmware ......................................................................................................................................................... 452
Upload Firmware to TFTP ....................................................................................................................................... 452
Upload Firmware to RCP ......................................................................................................................................... 453
Upload Firmware to HTTP ....................................................................................................................................... 454
Download Configuration .............................................................................................................................................. 454
Download Configuration from TFTP ........................................................................................................................ 454
Download Configuration from RCP ......................................................................................................................... 455
Download Configuration from HTTP ....................................................................................................................... 455
Upload Configuration .................................................................................................................................................. 456
Upload Configuration to TFTP ................................................................................................................................. 456
Upload Configuration to RCP .................................................................................................................................. 456
Upload Configuration to HTTP ................................................................................................................................ 457
Upload Log File ........................................................................................................................................................... 458
Upload Log to TFTP ................................................................................................................................................ 458
Upload Log to RCP .................................................................................................................................................. 458
Upload Log to HTTP ................................................................................................................................................ 459
Reset ........................................................................................................................................................................... 459
Reboot System ............................................................................................................................................................ 460
Appendices 461
Appendix A Mitigating ARP Spoofing Attacks Using Packet Content ACL ............................................................ 461
Appendix B Password Recovery Procedure .......................................................................................................... 467
Appendix C System Log Entries ............................................................................................................................. 468
Appendix D Trap Entries ........................................................................................................................................ 488

Table of Contents

Related product manuals