MAINTENANCE
Overview
This chapter explains how to configure the screens that let you maintain the firmware and configuration files.
Certificates
The Switch can use HTTPS certificates that are verified by a third party to create secure HTTPS connections between your computer and the Switch. This way, you may securely access the Switch using the Web Configurator.
Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Use this screen to import the Switch's CA-signed certificates.
The following table describes the labels in this screen.
MAINTENANCE > Certificates > Certificates 
label
description
File Path
Click Choose File or Browse to find the certificate file you want to upload.
Password
Enter the certificate file’s password that was created when the PKCS #12 file was exported. The password consists of up to 32 printable ASCII characters except [ ? ], [ | ], [ ' ], [ " ], or [ , ].
Import
Click this button to save the certificate that you have enrolled from a certification authority from your computer to the Switch.
Service
This field displays the service type that this certificate is for.
Subject
This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country.
Valid From
This field displays the date that the certificate becomes applicable.
Valid To
This field displays the date that the certificate expires.
 
Select an entry’s checkbox to select a specific entry.
Delete
Click this button to delete the certificate (or certification request). You cannot delete a certificate that one or more features is configured to use.
Install Certificates
After buying the certificates from a trusted third-party Certificate Authorities (CA), (for example, DigiCert), install the certificates.
HTTPS Certificates
Use this screen to view the HTTPS certificate details. Click a hyperlink in the Service column in the MAINTENANCE > Certificates > Certificates screen.
Cluster Management Overview
Cluster Management allows you to manage switches through one Switch, called the cluster manager. The switches must be directly connected and be in the same VLAN group so as to be able to communicate with one another.
Zyxel Clustering Management Specifications
Maximum number of cluster members
24
Cluster Member Models
Must be compatible with Zyxel cluster management implementation.
Cluster Manager
The through which you manage the cluster member switches.
Cluster Members
The switches being managed by the cluster manager Switch.
In the following example, switch A in the basement is the cluster manager and the other switches on the upper floors of the building are cluster members.
Clustering Application Example
Cluster Management Status
Use this screen to view the role of the Switch within the cluster and to access a cluster member Switch’s Web Configurator.
*A cluster can only have one manager.
The following table describes the labels in this screen.
MAINTENANCE > Cluster Management Status 
label
Description
Status
This field displays the role of this Switch within the cluster.
Manager
Member (you see this if you access this screen in the cluster member Switch directly and not through the cluster manager)
None (neither a manager nor a member of a cluster)
Manager
This field displays the cluster manager Switch’s hardware MAC address.
The Number Of Member
This field displays the number of switches that make up this cluster. The following fields describe the cluster member switches.
Index
You can manage cluster member switches through the cluster manager Switch. Each number in the Index column is a hyperlink leading to the cluster member Switch’s Web Configurator.
MAC Address
This is the cluster member Switch’s hardware MAC address.
Name
This is the cluster member Switch’s System Name.
Model
This field displays the model name.
Status
This field displays:
Online (the cluster member Switch is accessible)
Error (for example the cluster member Switch password was changed or the Switch was set as the manager and so left the member list, and so on)
Offline (the Switch is disconnected – Offline shows approximately 1.5 minutes after the link between cluster member and manager goes down)
Clustering Management Setup
Use this screen to configure clustering management.
The following table describes the labels in this screen.
MAINTENANCE > Cluster Management > Cluster Management Setup 
label
Description
Clustering Manager
The following fields relate to configuring the cluster manager.
Active
Enable the switch button to have this Switch become the cluster manager switch. A cluster can only have one manager. Other (directly connected) switches that are set to be cluster managers will not be visible in the Clustering Candidates list. If a Switch that was previously a cluster member is later set to become a cluster manager, then its Status is displayed as Error in the Cluster Management Status screen and a warning icon appears in the member summary list below.
Name
Type a name to identify the Clustering Manager. You may use up to 32 printable ASCII characters except [ ? ], [ | ], [ ' ], [ " ], or [ , ]. (spaces are allowed).
VID
This is the VLAN ID and is only applicable if the Switch is set to 802.1Q VLAN. All switches must be directly connected and in the same VLAN group to belong to the same cluster. Switches that are not in the same VLAN group are not visible in the Clustering Candidates list. This field is ignored if the Clustering Manager is using Port-based VLAN.
Apply
Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Cancel
Click Cancel to begin configuring this screen afresh.
Clustering Candidate
The next summary table shows the information for the clustering members configured.
Add/Edit
Click this button to create or configure a clustering candidate.
Delete
Click this button to remove the clustering candidate.
 
Select an entry’s checkbox to select a specific entry. Otherwise, select the checkbox in the table heading row to select all entries.
Index
This is the index number of a cluster member switch.
MAC Address
This is the cluster member switch’s hardware MAC address.
Name
This is the cluster member switch’s System Name.
Model
This is the cluster member switch’s model name.
Click the Add/Edit button to open the Add/Edit screen. Use this screen to configure a clustering candidate for the Switch.
The following table describes the labels in this screen.
MAINTENANCE > Cluster Management > Cluster Management Setup > Add/Edit 
label
Description
List
A list of suitable candidates found by auto-discovery is shown here. The switches must be directly connected. Directly connected switches that are set to be cluster managers will not be visible in the Clustering Candidate list. Switches that are not in the same management VLAN group will not be visible in the Clustering Candidate list.
Password
Each cluster member’s password is its Web Configurator password. Select a member in the Clustering Candidate list and then enter its Web Configurator password. If that switch administrator changes the Web Configurator password afterwards, then it cannot be managed from the Cluster Manager. Its Status is displayed as Error in the Cluster Management Status screen.
If multiple devices have the same password then hold [SHIFT] and click those switches to select them. Then enter their common Web Configurator password.
You can enter 4 up to 32 printable ASCII characters except [ ? ], [ | ], [ ' ], [ " ], or [ , ].
Apply
Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Clear
Click Clear to reset the fields to the factory defaults.
Cancel
Click Cancel to begin configuring this screen afresh.
Restore Configuration
Use this screen to restore a previously saved configuration file (See Backup Configuration for more information on how to back up a configuration file) from your computer to the Switch.
1 Click Choose File or Browse to locate the configuration file you wish to restore.
2 After you have specified the file, click Restore.
The Switch will run on the restored configuration after the restore process.
Backup Configuration
Backing up your Switch configurations allows you to create various “snap shots” of your device from which you may restore at a later date. Use this screen to back up your current Switch configuration to a computer.
Follow the steps below to back up the current Switch configuration to your computer in this screen.
1 Select which Switch configuration file you want to download to your computer.
2 Click Backup.
3 If the current configuration file is open and/or downloaded to your computer automatically, you can click File > Save As on your computer to save the file to a specific place.
If a dialog box pops up asking whether you want to open or save the file, click Save or Save File to download it to the default downloads folder on your computer. If a Save As screen displays after you click Save or Save File, choose a location to save the file on your computer from the Save in drop-down list box and type a descriptive name for it in the File name list box. Click Save to save the configuration file to your computer.
Erase Running-Configuration
Follow the steps below to reset the Switch back to the Zyxel default configuration settings.
1 In the Erase Running Configuration screen, click the Erase button to clear all Switch configuration information you configured and return to the Zyxel default configuration settings.
2 Click YES to remove the running configuration on the Switch.
3 In the Web Configurator, click the Save button in the top of the screen to make the changes take effect. If you want to access the Switch Web Configurator again, you may need to change the IP address of your computer to be in the same subnet as that of the default Switch IP address (192.168.1.1 or DHCP-assigned IP).
Save Configuration
Click Config 1 to save the current configuration settings permanently to Configuration 1 on the Switch. These configurations are set up according to your network environment.
Click Config 2 to save the current configuration settings permanently to Configuration 2 on the Switch. These configurations are set up according to your network environment.
Click Custom Default to save the current configuration settings permanently to a customized default file on the Switch. If configuration changes cause the Switch to behave abnormally, click Custom Default (in the MAINTENANCE > Reboot System > Reboot System screen) to have the Switch automatically reboot and restore the saved Custom Default configuration file.
*Custom Default is only available in Standalone mode.
*If a customized default file was not saved, clicking Custom Default in the MAINTENANCE > Reboot System > Reboot System screen loads the factory default configuration on the Switch.
Alternatively, click Save on the top right in any screen to save the configuration changes to the current configuration.
*Clicking the Apply button after making configuration does NOT save the changes permanently. All unsaved changes are erased after you reboot the Switch.
Configure Clone
Cloning allows you to copy the basic and advanced settings from a source port to a destination port or ports.
The following table describes the labels in this screen.
MAINTENANCE > Configuration > Configure Clone > Configure Clone 
label
Description
Configure Clone
Source/Destination
Port
Enter the source port under the Source label. This port’s attributes are copied.
Enter the destination port or ports under the Destination label. These are the ports which are going to have the same attributes as the source port. You can enter individual ports separated by a comma or a range of ports by using a dash.
Example:
2, 4, 6 indicates that ports 2, 4 and 6 are the destination ports.
2-6 indicates that ports 2 through 6 are the destination ports.
Port Features
 
Select a feature’s checkbox to select a specific feature. Otherwise, select the checkbox in the table heading row to select all features for a category.
SYSTEM
Select the system feature (you configured in the SYSTEM menus) to be copied to the destination ports. Otherwise, select the SYSTEM checkbox in the table heading row to select all features for a category.
PORT
Select which port features (you configured in the PORT menus) should be copied to the destination ports. Otherwise, select the PORT checkbox in the table heading row to select all features for a category.
SWITCHING
Select which switching features (you configured in the SWITCHING menus) should be copied to the destination ports. Otherwise, select the SWITCHING checkbox in the table heading row to select all features for a category.
NETWORKING
Select the networking feature (you configured in the NETWORKING menus) to be copied to the destination ports. Otherwise, select the NETWORKING checkbox in the table heading row to select all features for a category.
SECURITY
Select which security features (you configured in the SECURITY menus) should be copied to the destination ports. Otherwise, select the SECURITY checkbox in the table heading row to select all features for a category.
Apply
Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Cancel
Click Cancel to begin configuring this screen afresh.
Diagnostic
Use this screen to ping IP addresses, run a traceroute, perform port tests or show the Switch’s location between devices.
The following table describes the labels in this screen.
MAINTENANCE > Diagnostic > Diagnostic 
LABEL
DESCRIPTION
Ping Test
IPv4
Select this option if you want to ping an IPv4 address. Otherwise, select to send ping requests to all VLANs on the Switch.
IPv6
Select this option if you want to ping an IPv6 address. You can also select vlan and specify the ID number of the VLAN to which the Switch is to send ping requests. Otherwise, select to send ping requests to all VLANs on the Switch.
IP Address/Host Name
Type the IP address or host name of a device that you want to ping in order to test a connection.
Click Ping to have the Switch ping the IP address.
Count
Enter the number of ICMP Echo Request (ping) messages the Switch continuously sends.
Trace Route Test
IPv4
Select this option if you want to trace the route packets taken to a device with an IPv4 address. Otherwise, select to trace the path on any VLAN.
*The device to which you want to run a traceroute must belong to the VLAN you specify here.
IPv6
Select this option if you want to trace the route packets taken to a device with an IPv6 address.
IP Address/Host Name
Enter the IP address or host name of a device to which you want to perform a traceroute.
Click Trace Route to have the Switch perform the traceroute function. This determines the path a packet takes to the specified device.
TTL
Enter the Time To Live (TTL) value for the ICMP Echo Request packets. This is to set the maximum number of the hops (routers) a packet can travel through. Each router along the path will decrement the TTL value by one and forward the packets. When the TTL value becomes zero and the destination is not found, the router drops the packets and informs the sender.
Wait Time
Specify how many seconds the Switch waits for a response to a probe before running another traceroute.
Queries
Specify how many times the Switch performs the traceroute function.
Ethernet Port Test
Port
Enter a port number and click Port Test to perform an internal loopback test.
Port
This is the number of the physical Ethernet port on the Switch.
Cable Diagnostics
Port
Enter a port number and click Diagnose to perform a physical wire-pair test of the Ethernet connections on the specified ports. The following fields display when you diagnose a port.
*This feature is limited to within 100 meters only.
Port
This is the number of the physical Ethernet port on the Switch.
Channel
An Ethernet cable usually has four pairs of wires. A 10BASE-T or 100BASE-TX port only use and test two pairs, while a 1000BASE-T port requires all four pairs.
This displays the descriptive name of the wire-pair in the cable.
Pair status
Ok: The physical connection between the wire-pair is okay.
Open: There is no physical connection (an open circuit detected) between the wire-pair.
Short: There is an short circuit detected between the wire-pair.
Unknown: The Switch failed to run cable diagnostics on the cable connected this port.
Unsupported: The port is a fiber port or it is not active.
Cable length
This displays the total length of the Ethernet cable that is connected to the port when the Pair status is Ok and the Switch chipset supports this feature.
This shows N/A if the Pair status is Open or Short. Check the Distance to fault.
This shows Unsupported if the Switch chipset does not support to show the cable length.
Distance to fault
This displays the distance between the port and the location where the cable is open or shorted.
This shows N/A if the Pair status is Ok.
This shows Unsupported if the Switch chipset does not support to show the distance.
Locator LED
 
Enter a time interval (in minutes) and click Blink to show the actual location of the Switch between several devices in a rack.
The default time interval is 30 minutes.
Click Stop to have the Switch terminate the blinking locater LED.
Firmware Upgrade
You can upgrade the Switch’s firmware through Web Configurator or NCC.
Firmware Upgrade Through NCC
In cloud management mode, NCC will first check if the firmware on the Switch needs to be upgraded. If it does, the Switch will upgrade the firmware immediately. If the firmware does not need to be upgraded, but there is newer firmware available for the Switch, then it will be upgraded according to the firmware upgrade schedule for the Switch on the NCC.
On the NCC web portal, go to Site-wide > Configure > Firmware management > Firmware management to schedule the firmware upgrade time.
*While the Switch is rebooting, do NOT turn off the power.
Firmware Upgrade Through the Web Configurator
The Switch supports dual firmware images, Firmware 1 and Firmware 2. Use this screen to specify which image is updated when firmware is uploaded using the Web Configurator and to specify which image is loaded when the Switch starts up.
*Make sure you have downloaded (and unzipped) the correct model firmware and version to your computer before uploading to the device.
The top of the screen shows which firmware version is currently Running on the Switch. Click Choose File or Browse to locate the firmware file you wish to upload to the Switch in the File Path field. Click Upgrade to load the new firmware. The Switch does not apply the uploaded firmware immediately. Firmware upgrades are only applied after you reboot the Switch using the uploaded firmware.
Click the Config Boot Image drop-down list box to select the boot image (Firmware1 or Firmware2) you want the Switch to use when rebooting, click Apply. Restart the Switch (manually or using the MAINTENANCE > Reboot System > Reboot System screen) to apply the firmware image you selected.
After the process is complete, see the DASHBOARD screen to verify your current firmware version number.
MAINTENANCE > Firmware Upgrade > Firmware Upgrade 
label
description
Name
This is the name of the Switch that you are configuring.
Version
The Switch has 2 firmware sets, Firmware 1 and Firmware 2, residing in flash.
Running shows the version number (and model code) and MM/DD/YYYY creation date of the firmware currently in use on the Switch (Firmware 1 or Firmware 2). The firmware information is also displayed at System Information in Basic Setting.
Firmware 1 shows its version number (and model code) and MM/DD/YYYY creation date.
Firmware 2 shows its version number (and model code) and MM/DD/YYYY creation date.
Boot Image
Current Boot Image
This displays which firmware is currently in use on the Switch (Firmware 1 or Firmware 2).
Config Boot Image
Select which firmware (Firmware 1 or Firmware 2) should load, click Apply and reboot the Switch to see changes, you will also see changes in the Current Boot Image field above as well.
Apply
Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Cancel
Click Cancel to begin configuring this screen afresh.
Firmware
Choose to upload the new firmware to (Firmware) 1 or (Firmware) 2.
File Path
Click Choose File or Browse to locate the firmware file you wish to upload to the Switch.
Upgrade
Click Upgrade to load the new firmware. Firmwares are only applied after a reboot. To reboot, go to MAINTENANCE > Reboot System > Reboot System and click Config 1, Config 2 or Factory Default (Config 1, Config 2, Factory Default, and Custom Default are the configuration files you want the Switch to use when it restarts).
Reboot System
Reboot System allows you to restart the Switch without physically turning the power off. It also allows you to load configuration one (Config 1), configuration two (Config 2), a Custom Default or the Factory Default configuration when you reboot. Follow the steps below to reboot the Switch.
*Custom Default is only available in Standalone mode.
1 Click the Config 1, Config 2, Factory Default, or Custom Default button to reboot and load that configuration file. The confirmation screen displays.
2 Click YES and then wait for the Switch to restart. This takes up to 2 minutes.
Click Config 1 and follow steps 1 to 2 to reboot and load configuration one on the Switch.
Click Config 2 and follow steps 1 to 2 to reboot and load configuration two on the Switch.
Click Factory Default and follow steps 1 to 2 to reboot and load Zyxel factory default configuration settings on the Switch.
Click Custom Default and follow steps 1 to 2 to reboot and load a customized default file on the Switch. This will save the custom default configuration settings to both Configuration 1 and Configuration 2.
*If a customized default file was not saved, clicking Custom Default loads the factory default configuration on the Switch.
SSH Authorized Keys
The Switch can use SSH-authorized keys to authenticate secure SSH connections between a client computer and the Switch (also called the server) without needing a password to connect to the Switch. You can use a third-party utility to generate a private and public key for SSH, for example:
In Windows, use the PuTTY terminal emulator
In Linux Ubuntu, use the “ssh-keygen” command.
The Switch and the client computer should have a unique set of private and public keys for encryption/decryption.
Use this screen to import the client computer’s public key into the Switch.
The following table describes the labels in this screen.
MAINTENANCE > SSH Authorized Keys > SSH Authorized Keys 
label
description
File Path
Click Choose File or Browse to find the authorized key file you want to upload.
Import
Click this button to save the authorized key file you want to import from your computer to the Switch.
 
Select an entry’s checkbox to select a specific key.
User
This field displays the user name of the authorized key file (up to 32 characters).
Hostname
This field displays the hostname of the authorized key file (up to 32 characters only).
Content
This field displays the actual encryption key’s text string (up to 64 characters).
Delete
After selecting an entry’s checkbox, click this button to delete the authorized key file.
Generate the SSH Authorized Keys
You must install an SSH client program on a client computer (Windows or Linux operating system) to connect to the Switch over SSH.
Example – Generate the SSH Authorized Keys on Windows
PuTTY is a free and open-source terminal emulator. It supports the SSH network protocol. To generate the SSH-authorized keys in PuTTY, the following are the steps at the time of writing:
1 Run PuTTYgen.
2 Select RSA in the Type of key to generate. RSA (Rivest-Shamir-Adleman) is an asymmetric encryption scheme that generates its keys by multiplying two pseudo-random prime numbers. Enter 2048 in the Number of bits in a generated key. SSH keys with encryption lower than 2048 are considered insecure. Then click Generate.
3 Move the mouse back and forth over the blank area to complete the key generation.
4 (Optional) The Key passphrase and Confirm passphrase fields allow you to set a passphrase for your key. Use the passphrase to encrypt the key on your computer. When set, you need to enter the passphrase to use the key. See step 5 on Run PuTTY for SSH Connections on Windows for more information.
5 Click Save public key and Save private key to save the generated keys in your computer.
6 Copy the text on the generated public key into a text editor app like Notepad.
7 At the end of the text string, enter “@(Hostname)”. This will appear in the Hostname field in the MAINTENANCE > SSH Authorized Keys > SSH Authorized Keys screen. Press Enter to add a line break, then save the text file. Import the text file into the Switch using the SSH Authorized Keys screen.
*The Switch only supports one SSH-authorized key at a time. Only one client computer can authenticate without entering a password using an SSH connection.
Run PuTTY for SSH Connections on Windows
To use PuTTY to connect to the Switch through SSH, the following are the steps at the time of writing:
1 Run PuTTY. In the Session screen, enter the IP address of the Switch and “22” for the Port. Select SSH for the Connection type.
2 In the Data screen, enter admin for Auto-login username. The Switch only supports the admin login for the SSH-authorized key.
3 In the Credentials screen, click Browse to locate the generated private key.
4 In the Session screen, you can save the PuTTY configuration by entering a name (for example, “Sample”) in the Saved Sessions, then click Save. Click Open to start the SSH connection.
5 Enter the Passphrase for key if you configured the Key passphrase in step 4 of using the PuTTY Key Generator.
You have now logged in to the Switch.
Example – Generate the SSH Authorized Keys on Linux
To generate the SSH-authorized keys in Ubuntu, enter the following commands at the time of writing:
id_rsa” is the private key and “id_rsa.pub” is the public key generated in Ubuntu.
SSH Host Keys
The Switch uses its SSH host public key (P) to authenticate secure SSH connections from an SSH client (C).
When the Switch receives a connection request from an SSH client, the Switch sends its public key to the SSH client. If it's the first time the SSH client accesses the Switch, the SSH client may receive a warning message prompting it to accept or reject the public key.
After the SSH client accepts the Switch's public key, the SSH client encrypts the SSH client's username and password with the Switch's public key and sends the encrypted credentials to the Switch.
When the Switch gets the encrypted credentials from the SSH client, the Switch uses its private key to decrypt the encrypted credentials from the SSH client. If the credentials are correct, the Switch authenticates the SSH client and the SSH client can log into the Switch using SSH.
The following table describes the labels in this screen.
MAINTENANCE > SSH Host Keys > SSH Host Keys 
label
description
RSA
At the time of writing, the Switch supports RSA encryption for the SSH host key. See Generate the SSH Authorized Keys for information about the RSA.
Regenerate Key
Click this button to regenerate the Switch's default host key.
*After the Switch regenerates the host key, the previous authenticated SSH clients may receive a message to replace the old host key with the new one the next time they connect to the Switch.
Tech-Support
The Tech-Support feature is a log enhancement tool that logs useful information such as CPU utilization history, memory and Mbuf (Memory Buffer) log and crash reports for issue analysis by customer support should you have difficulty with your Switch. The Tech Support menu eases your effort in obtaining reports and it is also available in CLI command by entering the “Show tech-support” command.
You may need WordPad or similar software to see the log report correctly. The table below describes the fields in the above screen.
MAINTENANCE > Tech-Support > Tech-Support 
Label
description
CPU
Type a number ranging from 50 to 100 in the CPU threshold box, and type another number ranging from 5 to 60 in the seconds box then click Apply.
For example, 80 for CPU threshold and 5 for seconds means a log will be created when CPU utilization reaches over 80% and lasts for 5 seconds.
The log report holds 7 days of CPU log data and is stored in volatile memory (RAM). The data is lost if the Switch is turned off or in event of power outage. After 7 days, the logs wrap around and new ones and replace the earliest ones.
The higher the CPU threshold number, the fewer logs will be created, and the less data technical support will have to analyze and vice versa.
Mbuf
Type a number ranging from 50 to 100 in the Mbuf (Memory Buffer) threshold box. The Mbuf log report is stored in flash (permanent) memory.
For example, Mbuf 50 means a log will be created when the Mbuf utilization is over 50%.
The higher the Mbuf threshold number, the fewer logs will be created, and the less data technical support will have to analyze and vice versa.
Apply
Click Apply to save your changes to the Switch’s run-time memory. The Switch loses these changes if it is turned off or loses power, so use the Save link on the top navigation panel to save your changes to the non-volatile memory when you are done configuring.
Cancel
Click Cancel to begin configuring this screen afresh.
All
Click Download to see all the log report and system status. This log report is stored in flash memory. If the All log report is too large, you can download the log reports separately below.
Crash
Click Download to see the crash log report. The log will include information of the last crash and is stored in flash memory.
CPU
Click Download to see the CPU history log report. The 7-days log is stored in RAM and you will need to save it, otherwise it will be lost when the Switch is shutdown or during power outage.
Memory
Click Download to see the memory section log report. This log report is stored in flash memory.
Mbuf
Click Download to see the Mbuf (Memory Buffer) log report. This log report is stored in flash memory.
ROM
Click Download to see the Read Only Memory (ROM) log report. This report is stored in flash memory.