Uploading the Violation Log
The security violation log can be uploaded, via TFTP, to a server.
To upload the log, enter the following commands:
1. SET TFTP SERVER_IP_ADDRESS (to define where the file is to be stored on the server)
2. SET TFTP FILE_NAME (to define the path name for the file on the server)
3. SET TFTP FILE_TYPE SECURITY_LOG
4. UPLOAD (to upload the file).
90
IBM 8265: User's Guide
Содержание 8265 Nways ATM Switch
Страница 1: ...8265 Nways ATM Switch IBM User s Guide SA33 0456 01...
Страница 2: ......
Страница 3: ...8265 Nways ATM Switch IBM User s Guide SA33 0456 01...
Страница 12: ...x IBM 8265 User s Guide...
Страница 14: ...xii IBM 8265 User s Guide...
Страница 16: ...xiv IBM 8265 User s Guide...
Страница 17: ...Part 1 Configuring Your ATM Network Copyright IBM Corp 1994 1998 1...
Страница 18: ...2 IBM 8265 User s Guide...
Страница 38: ...22 IBM 8265 User s Guide...
Страница 52: ...36 IBM 8265 User s Guide...
Страница 90: ...74 IBM 8265 User s Guide...
Страница 107: ...Part 2 Managing the 8265 Copyright IBM Corp 1994 1998 91...
Страница 108: ...92 IBM 8265 User s Guide...
Страница 134: ...118 IBM 8265 User s Guide...
Страница 141: ...Part 3 Appendixes Copyright IBM Corp 1994 1998 125...
Страница 142: ...126 IBM 8265 User s Guide...
Страница 174: ...158 IBM 8265 User s Guide...
Страница 178: ...162 IBM 8265 User s Guide...
Страница 188: ......
Страница 191: ......
Страница 192: ...IBM SA33 456 1...