xStack® DGS-3120 Series Managed Switch Web UI Reference Guide
vii
Statistics ...................................................................................................................................................................... 284
Port Statistics ........................................................................................................................................................... 284
Packet Size .............................................................................................................................................................. 292
Mirror ........................................................................................................................................................................... 294
Port Mirror Settings .................................................................................................................................................. 294
RSPAN Settings ...................................................................................................................................................... 294
sFlow (EI Mode Only) .................................................................................................................................................. 296
sFlow Global Settings .............................................................................................................................................. 296
sFlow Analyzer Server Settings .............................................................................................................................. 296
sFlow Flow Sampler Settings .................................................................................................................................. 297
sFlow Counter Poller Settings ................................................................................................................................. 298
Ping Test ..................................................................................................................................................................... 299
Trace Route................................................................................................................................................................. 300
Peripheral .................................................................................................................................................................... 302
Device Environment ................................................................................................................................................ 302
Chapter 12
Save and Tools ..................................................................................................... 303
Save Configuration / Log ............................................................................................................................................. 303
Stacking Information ................................................................................................................................................... 303
Download firmware ..................................................................................................................................................... 305
Download Firmware From TFTP ............................................................................................................................. 305
Download Firmware From HTTP ............................................................................................................................. 305
Upload Firmware ......................................................................................................................................................... 306
Upload Firmware To TFTP ...................................................................................................................................... 306
Download Configuration .............................................................................................................................................. 307
Download Configuration From TFTP ....................................................................................................................... 307
Download Configuration From HTTP ...................................................................................................................... 308
Upload Configuration .................................................................................................................................................. 308
Upload Configuration To TFTP................................................................................................................................ 308
Upload Configuration To HTTP ............................................................................................................................... 309
Upload Log File ........................................................................................................................................................... 310
Upload Log To TFTP ............................................................................................................................................... 310
Upload Log To HTTP ............................................................................................................................................... 310
Reset ........................................................................................................................................................................... 311
Reboot System ............................................................................................................................................................ 311
Appendix Section ........................................................................................................................ 313
Appendix A
Mitigating ARP Spoofing Attacks Using Packet Content ACL ............................................................ 313
How Address Resolution Protocol works ................................................................................................................ 313
How ARP Spoofing Attacks a Network .................................................................................................................... 315
Prevent ARP Spoofing via Packet Content ACL ..................................................................................................... 316
Configuration ........................................................................................................................................................... 316
Appendix B
Password Recovery Procedure .......................................................................................................... 319
Appendix C
System Log Entries ............................................................................................................................. 320
Appendix D
Trap Log Entries ................................................................................................................................. 330
Содержание xStack DGS-3120-24TC
Страница 1: ......