GS-4012F/4024 User’s Guide
Figure 168 CLI: Backup Configuration Example ...................................................
274
Figure 169 CLI: Restore Configuration Example ...................................................
275
Figure 170 CLI: boot config Command Example ...................................................
Figure 171 CLI: reload config Command Example ................................................
Figure 172 CLI: Reset to the Factory Default Example .........................................
276
Figure 173 no mirror-port Command Example ......................................................
Figure 174 no https timeout Command Example ..................................................
Figure 175 no trunk Command Example ...............................................................
277
Figure 176 no port-access-authenticator Command Example ..............................
278
Figure 177 no ssh Command Example .................................................................
Figure 178 interface Command Example ..............................................................
279
Figure 179 interface Command Example ..............................................................
280
Figure 180 interface bpdu-control Command Example .........................................
Figure 181 broadcast-limit Command Example ....................................................
281
Figure 182 bandwidth-limit Command Example ....................................................
Figure 183 mirror Command Example ..................................................................
282
Figure 184 gvrp Command Example .....................................................................
283
Figure 185 ingress-check Command Example ......................................................
Figure 186 frame-type Command Example ...........................................................
284
Figure 187 spq Command Example ......................................................................
Figure 188 wrr Command Example .......................................................................
285
Figure 189 egress set Command Example ...........................................................
Figure 190 qos priority Command Example ..........................................................
286
Figure 191 name Command Example ...................................................................
Figure 192 speed-duplex Command Example ......................................................
Figure 193 Tagged VLAN Configuration and Activation Example .........................
289
Figure 194 CPU VLAN Configuration and Activation Example .............................
290
Figure 195 GARP STATUS Command Example ...................................................
Figure 196 GARP Timer Command Example .........................................................
291
Figure 197 GVRP Status Command Example .......................................................
Figure 198 vlan1q port default vid Command Example .........................................
292
Figure 199 frame type Command Example ...........................................................
293
Figure 200 no gvrp Command Example ................................................................
Figure 201 Modifying Static VLAN Example ..........................................................
294
Figure 202 no vlan Command Example ................................................................
295
Figure 203 show vlan Command Example ............................................................
296
Figure 204 Pop-up Blocker .....................................................................................
299
Figure 205 Internet Options ...................................................................................
300
Figure 206 Internet Options ....................................................................................
301
Figure 207 Pop-up Blocker Settings .......................................................................
302
Figure 208 Internet Options ....................................................................................
303
Figure 209 Security Settings - Java Scripting .........................................................
304
Figure 210 Security Settings - Java ........................................................................
305
List of Figures
24