
Uploading the Violation Log
The security violation log can be uploaded, via TFTP, to a server.
To upload the log, enter the following commands:
1. SET TFTP SERVER_IP_ADDRESS (to define where the file is to be stored on the server)
2. SET TFTP FILE_NAME (to define the path name for the file on the server)
3. SET TFTP FILE_TYPE SECURITY_LOG
4. UPLOAD (to upload the file).
90
IBM 8265: User's Guide
Summary of Contents for 8265 Nways ATM Switch
Page 1: ...8265 Nways ATM Switch IBM User s Guide SA33 0456 01...
Page 2: ......
Page 3: ...8265 Nways ATM Switch IBM User s Guide SA33 0456 01...
Page 12: ...x IBM 8265 User s Guide...
Page 14: ...xii IBM 8265 User s Guide...
Page 16: ...xiv IBM 8265 User s Guide...
Page 17: ...Part 1 Configuring Your ATM Network Copyright IBM Corp 1994 1998 1...
Page 18: ...2 IBM 8265 User s Guide...
Page 38: ...22 IBM 8265 User s Guide...
Page 52: ...36 IBM 8265 User s Guide...
Page 90: ...74 IBM 8265 User s Guide...
Page 107: ...Part 2 Managing the 8265 Copyright IBM Corp 1994 1998 91...
Page 108: ...92 IBM 8265 User s Guide...
Page 134: ...118 IBM 8265 User s Guide...
Page 141: ...Part 3 Appendixes Copyright IBM Corp 1994 1998 125...
Page 142: ...126 IBM 8265 User s Guide...
Page 174: ...158 IBM 8265 User s Guide...
Page 178: ...162 IBM 8265 User s Guide...
Page 188: ......
Page 191: ......
Page 192: ...IBM SA33 456 1...