xStack
®
DGS-3200 Series Layer 2 Gigabit Ethernet Managed Switch
viii
Save Log .................................................................................................................................................................................... 251
Save All...................................................................................................................................................................................... 252
Download Configuration File/Download Configuration File to NV-RAM ............................................................................... 252
Download Configuration File to SD Card.................................................................................................................................. 253
Download Firmware/Download Firmware to NV-RAM ........................................................................................................... 253
Download Firmware to SD Card................................................................................................................................................ 254
Upload Configuration File/Upload Configuration File to TFTP................................................................................................ 254
Upload Log File/Upload Log File to TFTP................................................................................................................................255
Reset........................................................................................................................................................................................... 255
Reboot System ........................................................................................................................................................................... 256
Appendix A – Mitigating ARP Spoofing Attacks Using Packet Content ACL ......................................257
Appendix B – Switch Log Entries...............................................................................................................264
Appendix C – Trap Logs .............................................................................................................................276
Appendix D – Password Recovery Procedure...........................................................................................279
Appendix E – Glossary ................................................................................................................................280
Warranty ......................................................................................................................................................282