WAC Authentication State ........................................................................................................................................ 290
ARP & FDB Table ..................................................................................................................................................... 291
MAC Address Table .................................................................................................................................................. 292
System Log ............................................................................................................................................................... 293
Save Services and Tools ........................................................................................................... 294
Save Configuration ID 1 ............................................................................................................................................ 294
Save Configuration ID 2 ............................................................................................................................................ 295
Save Log ................................................................................................................................................................... 295
Save All ..................................................................................................................................................................... 295
Configuration File Backup & Restore ....................................................................................................................... 296
Upload Log File ......................................................................................................................................................... 296
Reset ......................................................................................................................................................................... 296
Download Firmware .................................................................................................................................................. 297
Reboot System ......................................................................................................................................................... 297
Mitigating ARP Spoofing Attacks Using Packet Content ACL ............................................... 298
System Log and Trap List ......................................................................................................... 306
Glossary...................................................................................................................................... 318
Password Recovery Procedure ................................................................................................ 321