![Edge-Core Direk Tronik 24/48-Port Скачать руководство пользователя страница 281](http://html1.mh-extra.com/html/edge-core/direk-tronik-24-48-port/direk-tronik-24-48-port_management-manual_2359667281.webp)
Entering Commands
31-9
31
Command Line Processing
Commands are not case sensitive. You can abbreviate commands and parameters
as long as they contain enough letters to differentiate them from any other currently
available commands or parameters. You can use the Tab key to complete partial
commands, or enter a partial command followed by the “?” character to display a list
of possible matches. You can also use the following editing keystrokes for
command-line processing:
Table 31-3 Keystroke Commands
Keystroke
Function
Ctrl-A
Shifts cursor to start of command line.
Ctrl-B
Shifts cursor to the left one character.
Ctrl-C
Terminates the current task and displays the command prompt.
Ctrl-E
Shifts cursor to end of command line.
Ctrl-F
Shifts cursor to the right one character.
Ctrl-K
Deletes all characters from the cursor to the end of the line.
Ctrl-L
Repeats current command line on a new line.
Ctrl-N
Enters the next command line in the history buffer.
Ctrl-P
Enters the last command.
Ctrl-R
Repeats current command line on a new line.
Ctrl-U
Deletes from the cursor to the beginning of the line.
Ctrl-W
Deletes the last word typed.
Esc-B
Moves the cursor back one word.
Esc-D
Deletes from the cursor to the end of the word.
Esc-F
Moves the cursor forward one word.
Delete key or backspace key
Erases a mistake when entering a command.
Содержание Direk Tronik 24/48-Port
Страница 2: ......
Страница 4: ...ES4524D ES4548D F0 0 0 4 E112006 CS R01 149100030400A...
Страница 22: ...xxii Tables...
Страница 26: ...xxvi Figures...
Страница 28: ...Getting Started...
Страница 50: ...Initial Configuration 2 14 2...
Страница 52: ...Switch Management Configuring Domain Name Service 29 1 Switch Clustering 30 1...
Страница 68: ...Basic System Settings 4 8 4...
Страница 118: ...Simple Network Management Protocol 11 18 11...
Страница 142: ...Configuring 802 1X Port Authentication 14 8 14...
Страница 154: ...Access Control Lists 15 12 15...
Страница 232: ...Configuring Protocol Based VLANs 25 4 25...
Страница 252: ...Quality of Service 27 8 27...
Страница 282: ...Using the Command Line Interface 31 10 31...
Страница 290: ...General Commands 33 6 33...
Страница 300: ...System Management Commands 34 10 34...
Страница 308: ...File Management Commands 35 8 35...
Страница 326: ...Event Logging Commands 37 8 37...
Страница 336: ...Time Commands 39 6 39...
Страница 406: ...Access Control List Commands 44 18 44...
Страница 418: ...Interface Commands 45 12 45...
Страница 432: ...Broadcast Storm Control Commands 47 2 47...
Страница 436: ...Rate Limit Commands 49 2 49...
Страница 478: ...VLAN Commands 52 18 52...
Страница 508: ...Quality of Service Commands 56 10 56...
Страница 518: ...Multicast Filtering Commands 57 10 57...
Страница 532: ...IPv4 Interface Commands 59 6 59...
Страница 560: ...IPv6 Interface Commands 60 28 60...
Страница 566: ...Switch Cluster Commands 61 6 61...
Страница 568: ...Appendices...
Страница 572: ...Software Specifications A 4 A TACACS Authentication Client MIB TCP MIB RFC 2012 Trap RFC 1215 UDP MIB RFC 2013...
Страница 582: ...Glossary Glossary 8...
Страница 587: ......
Страница 588: ...ES4524D ES4548D E112006 CS R01 149100030400A...