D-Link 28 Switch User Manual


 
xStack
®
DES-3200-10/18/28/28F Layer 2 Ethernet Managed Switch User Manual
vii
Browse Session Table .............................................................................................................................................. 211
MAC Address Table .................................................................................................................................................. 211
System Log ............................................................................................................................................................... 212
Save and Tools ........................................................................................................................... 213
Save Configuration ................................................................................................................................................... 213
Save Log ................................................................................................................................................................... 214
Save All ..................................................................................................................................................................... 214
Configuration File Upload & Download ..................................................................................................................... 214
Upload Log File ......................................................................................................................................................... 215
Reset ......................................................................................................................................................................... 215
Ping Test ................................................................................................................................................................... 216
Download Firmware .................................................................................................................................................. 217
Reboot System ......................................................................................................................................................... 217
Mitigating ARP Spoofing Attacks Using Packet Content ACL ............................................... 218
System Log Entries ................................................................................................................... 226
Glossary...................................................................................................................................... 237