
– 1481 –
C
L
ICENSE
I
NFORMATION
This product includes copyrighted third-party software subject to the terms of the GNU General Public
License (GPL), GNU Lesser General Public License (LGPL), or other related free software licenses.
The GPL code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the
copyrights of one or more authors. For details, refer to the section "The GNU General Public License"
below, or refer to the applicable license as included in the source-code archive.
T
HE
GNU G
ENERAL
P
UBLIC
L
ICENSE
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it
is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public License
applies to most of the Free Software Foundation's software and to any other program whose authors
commit to using it. (Some other Free Software Foundation software is covered by the GNU Library
General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses
are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish), that you receive source code or can get it if you want it, that you
can change the software or use pieces of it in new free programs; and that you know you can do
these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to
ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that
there is no warranty for this free software. If the software is modified by someone else and passed on,
we want its recipients to know that what they have is not the original, so that any problems introduced
by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger
that redistributors of a free program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any patent must be licensed for
everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
Содержание ECS4110-28T
Страница 1: ...Management Guide www edge core com ECS4110 28T 28P 52T 52P 28 52 Port Gigabit Ethernet Layer 2 Switch...
Страница 2: ......
Страница 4: ......
Страница 63: ...FIGURES 63 Figure 428 Configuring VLAN Translation 1177...
Страница 64: ...FIGURES 64...
Страница 72: ...TABLES 72...
Страница 74: ...SECTION I Getting Started 74...
Страница 102: ...SECTION II Web Configuration 102 General IP Routing on page 679...
Страница 154: ...CHAPTER 4 Basic Management Tasks Resetting the System 154...
Страница 198: ...CHAPTER 5 Interface Configuration VLAN Trunking 198 Figure 65 Configuring VLAN Trunking...
Страница 272: ...CHAPTER 9 Congestion Control Automatic Traffic Control 272...
Страница 286: ...CHAPTER 10 Class of Service Layer 3 4 Priority Settings 286...
Страница 420: ...CHAPTER 13 Security Measures DHCP Snooping 420...
Страница 566: ...CHAPTER 14 Basic Administration Protocols OAM Configuration 566...
Страница 638: ...CHAPTER 15 Multicast Filtering Multicast VLAN Registration for IPv6 638...
Страница 662: ...CHAPTER 16 IP Configuration Setting the Switch s IP Address IP Version 6 662...
Страница 678: ...CHAPTER 17 IP Services Configuring the PPPoE Intermediate Agent 678...
Страница 792: ...CHAPTER 21 System Management Commands Switch Clustering 792...
Страница 822: ...CHAPTER 23 Remote Monitoring Commands 822...
Страница 888: ...CHAPTER 24 Authentication Commands PPPoE Intermediate Agent 888...
Страница 968: ...CHAPTER 25 General Security Measures Port based Traffic Segmentation 968...
Страница 994: ...CHAPTER 26 Access Control Lists ACL Information 994...
Страница 1034: ...CHAPTER 28 Link Aggregation Commands Trunk Status Display Commands 1034...
Страница 1044: ...CHAPTER 29 Power over Ethernet Commands 1044...
Страница 1084: ...CHAPTER 33 UniDirectional Link Detection Commands 1084...
Страница 1090: ...CHAPTER 34 Address Table Commands 1090...
Страница 1194: ...CHAPTER 37 VLAN Commands Configuring Voice VLANs 1194...
Страница 1388: ...CHAPTER 42 CFM Commands Delay Measure Operations 1388...
Страница 1410: ...CHAPTER 44 Domain Name Service Commands 1410...
Страница 1420: ...CHAPTER 45 DHCP Commands DHCP Relay 1420...
Страница 1472: ...CHAPTER 46 IP Routing Commands IPv4 Commands 1472...
Страница 1474: ...SECTION IV Appendices 1474...
Страница 1502: ...COMMAND LIST 1502...
Страница 1513: ......
Страница 1514: ...ECS4110 28T ECS4110 28P ECS4110 52T ECS4110 52P E072014 ST R02 150200000929A...