D-Link DGS-3620-28PC-SI Product Manual page 10

Product manual
Table of Contents

Advertisement

xStack® DGS-3620 Series Managed Switch Web UI Reference Guide
Stacking Information ................................................................................................................................................... 449
Download Firmware .................................................................................................................................................... 451
Download Firmware from TFTP .............................................................................................................................. 451
Download Firmware from RCP ................................................................................................................................ 451
Download Firmware from HTTP .............................................................................................................................. 452
Upload Firmware ......................................................................................................................................................... 452
Upload Firmware to TFTP ....................................................................................................................................... 452
Upload Firmware to RCP ......................................................................................................................................... 453
Upload Firmware to HTTP ....................................................................................................................................... 454
Download Configuration .............................................................................................................................................. 454
Download Configuration from TFTP ........................................................................................................................ 454
Download Configuration from RCP ......................................................................................................................... 455
Download Configuration from HTTP ....................................................................................................................... 455
Upload Configuration .................................................................................................................................................. 456
Upload Configuration to TFTP ................................................................................................................................. 456
Upload Configuration to RCP .................................................................................................................................. 456
Upload Configuration to HTTP ................................................................................................................................ 457
Upload Log File ........................................................................................................................................................... 458
Upload Log to TFTP ................................................................................................................................................ 458
Upload Log to RCP .................................................................................................................................................. 458
Upload Log to HTTP ................................................................................................................................................ 459
Reset ........................................................................................................................................................................... 459
Reboot System ............................................................................................................................................................ 460
Mitigating ARP Spoofing Attacks Using Packet Content ACL ............................................................ 461
Password Recovery Procedure .......................................................................................................... 467
System Log Entries ............................................................................................................................. 468
Trap Entries ........................................................................................................................................ 488
ix

Advertisement

Table of Contents
loading

Table of Contents