– 957 –
C
L
ICENSE
I
NFORMATION
This product includes copyrighted third-party software subject to the terms of the GNU General Public
License (GPL), GNU Lesser General Public License (LGPL), or other related free software licenses.
The GPL code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the
copyrights of one or more authors. For details, refer to the section "The GNU General Public License"
below, or refer to the applicable license as included in the source-code archive.
T
HE
GNU G
ENERAL
P
UBLIC
L
ICENSE
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it
is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and
change free software--to make sure the software is free for all its users. This General Public License
applies to most of the Free Software Foundation's software and to any other program whose authors
commit to using it. (Some other Free Software Foundation software is covered by the GNU Library
General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses
are designed to make sure that you have the freedom to distribute copies of free software (and
charge for this service if you wish), that you receive source code or can get it if you want it, that you
can change the software or use pieces of it in new free programs; and that you know you can do
these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to
ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone understands that
there is no warranty for this free software. If the software is modified by someone else and passed on,
we want its recipients to know that what they have is not the original, so that any problems introduced
by others will not reflect on the original authors' reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger
that redistributors of a free program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any patent must be licensed for
everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
Содержание ES3510MA
Страница 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Страница 4: ...ABOUT THIS GUIDE 4...
Страница 30: ...CONTENTS 30...
Страница 40: ...FIGURES 40...
Страница 46: ...TABLES 46...
Страница 48: ...SECTION I Getting Started 48...
Страница 72: ...SECTION II Web Configuration 72...
Страница 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Страница 115: ...CHAPTER 4 Basic Management Tasks Resetting the System 115 Figure 23 Restarting the Switch Regularly...
Страница 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Страница 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Страница 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Страница 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Страница 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Страница 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Страница 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Страница 574: ...CHAPTER 22 SNMP Commands 574...
Страница 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Страница 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Страница 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Страница 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Страница 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Страница 848: ...CHAPTER 36 Quality of Service Commands 848...
Страница 900: ...CHAPTER 38 LLDP Commands 900...
Страница 910: ...CHAPTER 39 Domain Name Service Commands 910...
Страница 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Страница 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Страница 950: ...SECTION IV Appendices 950...
Страница 982: ...INDEX 982...
Страница 983: ......
Страница 984: ...ES3510MA E032010 ST R01 149100000046A...