![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/a/3d/a3d84fe1-4c9a-4a93-8ecf-52a91326577d/a3d84fe1-4c9a-4a93-8ecf-52a91326577d-bg8.png)
xStack
®
DES-3200-10/18/28/28F Layer 2 Ethernet Managed Switch User Manual
vii
Browse Session Table .............................................................................................................................................. 211
MAC Address Table .................................................................................................................................................. 211
System Log ............................................................................................................................................................... 212
Save and Tools ........................................................................................................................... 213
Save Configuration ................................................................................................................................................... 213
Save Log ................................................................................................................................................................... 214
Save All ..................................................................................................................................................................... 214
Configuration File Upload & Download ..................................................................................................................... 214
Upload Log File ......................................................................................................................................................... 215
Reset ......................................................................................................................................................................... 215
Ping Test ................................................................................................................................................................... 216
Download Firmware .................................................................................................................................................. 217
Reboot System ......................................................................................................................................................... 217
Mitigating ARP Spoofing Attacks Using Packet Content ACL ............................................... 218
System Log Entries ................................................................................................................... 226
Glossary...................................................................................................................................... 237