Netgear XCM8806 - 8800 SERIES 6-SLOT CHASSIS SWITCH 사용자 설명서

다운로드
페이지 968
  Appendix C.  Troubleshooting    
|
    
851
NETGEAR 8800 User Manual 
If you configure the switch to send core dump information to the internal memory card, 
specify the 
internal-memory
 option to transfer an existing core dump file from the internal 
memory card to the TFTP server. If you have a modular switch with an external compact flash 
memory card installed, specify the memorycard option to transfer an existing core dump file 
from the external memory card to the TFTP server. 
For more information about TFTP, see 
. For more information 
about managing the configuration or policy files stored on your system, see 
. For detailed information about downloading software 
image files, BootROM files, and switch configurations, see 
.
Deleting Files 
To delete a core dump file from your card, use the following command:
rm {internal-memory | memorycard} <file-name>
 
Where the following is true:
•     
internal-memory
—Specifies the internal memory card.
If you have core dump files stored in the internal memory and you attempt to download a 
new software image, you might have insufficient space to complete the image download. 
If this happens, delete core dump files from the internal memory. 
For example, if you have a modular switch with an external memory card installed with 
space available, transfer the files to the external memory card. 
•     
memorycard
—Specifies the removable external compact flash memory card. (This 
parameter is available only on modular switches.)
•     
file-name
—Specifies the name of the core dump file to delete. 
If you delete a core dump file from the system, that file is unavailable.
You can use the * wildcard to delete core dump files from the internal memory card.
For more information about this command, including managing the configuration or policy 
files stored on your system, se
Evaluation Precedence for ACLs
The ACLs on a port are evaluated in the following order: 
•     
Persistent dynamic ACLs
•     
Host-integrity permit ACLs
•     
MAC source address deny ACLs
•     
Source IP lockdown source IP permit ACLs
•     
Source IP lockdown deny all ACLs
•     
ARP validation CPU ACLs