Command Line Interface Guide
Page 49
show snmp views 1240 show trapflags 1242 snmp-server community 1244 snmp-server community-group 1246 snmp-server contact 1247 snmp-server enable traps 1247 snmp-server enable traps authentication 1249 snmp-server engineID local 1250 snmp-server filter 1251 snmp-server group 1253 snmp-server host 1254 snmp-server location 1256 snmp-server user 1257 snmp-server view 1258 snmp-server v3-host 1260 69 SSH Commands 1263 crypto key generate rsa 1264 crypto key pubkey-chain ssh 1265 ip ssh port 1266 ip ssh pubkey-auth 1267 ip ssh server 1268 Contents 49
show snmp views 1240 show trapflags 1242 snmp-server community 1244 snmp-server community-group 1246 snmp-server contact 1247 snmp-server enable traps 1247 snmp-server enable traps authentication 1249 snmp-server engineID local 1250 snmp-server filter 1251 snmp-server group 1253 snmp-server host 1254 snmp-server location 1256 snmp-server user 1257 snmp-server view 1258 snmp-server v3-host 1260 69 SSH Commands 1263 crypto key generate rsa 1264 crypto key pubkey-chain ssh 1265 ip ssh port 1266 ip ssh pubkey-auth 1267 ip ssh server 1268 Contents 49
Command Line Interface Guide
Page 50
key-string 1268 show crypto key mypubkey 1270 show crypto key pubkey-chain ssh 1271 show ip ssh 1273 user-key 1274 70 Syslog Commands 1275 clear logging file 1276 description 1277 level 1278 logging cli-command 1278 logging 1279 logging buffered 1280 logging console 1281 logging facility 1282 logging file 1282 logging on 1283 logging snmp 1284 logging web-session 1285 port 1285 show logging 1286 show logging file 1288 50 Contents
key-string 1268 show crypto key mypubkey 1270 show crypto key pubkey-chain ssh 1271 show ip ssh 1273 user-key 1274 70 Syslog Commands 1275 clear logging file 1276 description 1277 level 1278 logging cli-command 1278 logging 1279 logging buffered 1280 logging console 1281 logging facility 1282 logging file 1282 logging on 1283 logging snmp 1284 logging web-session 1285 port 1285 show logging 1286 show logging file 1288 50 Contents
Command Line Interface Guide
Page 58
...displays RMON information. SNMP Configures SNMP communities, traps and displays SNMP information. Table 1-1. Line Configures the console, SSH, and remote Telnet connection. Virtual LAN Routing (IPv4) Controls virtual LAN routing. Configuration and Image Manages the switch...-list information. Serviceability Tracing Controls display of Service options. PHY Diagnostics Diagnoses and displays the interface status. SSH Configures SSH authentication. 58 Command Groups System Command Groups (continued) Command Group Description Tunnel Interface (IPv6) Managing tunneling operations...
...displays RMON information. SNMP Configures SNMP communities, traps and displays SNMP information. Table 1-1. Line Configures the console, SSH, and remote Telnet connection. Virtual LAN Routing (IPv4) Controls virtual LAN routing. Configuration and Image Manages the switch...-list information. Serviceability Tracing Controls display of Service options. PHY Diagnostics Diagnoses and displays the interface status. SSH Configures SSH authentication. 58 Command Groups System Command Groups (continued) Command Group Description Tunnel Interface (IPv6) Managing tunneling operations...
Command Line Interface Guide
Page 61
SSH Public Key-chain • TC - User EXEC • VLAN - VLAN Configuration • v6ACL - IPv6 Access List Configuration • v6CMC • v6DP - ip http authentication Specifies .... GC login authentication Specifies the login authentication method list LC for GC accessing higher privilege levels. password Specifies a password on interfaces running IEEE 802.1X. SSH Public Key • SK - LC Command Groups 61 • SP -
SSH Public Key-chain • TC - User EXEC • VLAN - VLAN Configuration • v6ACL - IPv6 Access List Configuration • v6CMC • v6DP - ip http authentication Specifies .... GC login authentication Specifies the login authentication method list LC for GC accessing higher privilege levels. password Specifies a password on interfaces running IEEE 802.1X. SSH Public Key • SK - LC Command Groups 61 • SP -
Command Line Interface Guide
Page 128
... the meaning of SNMP notifications. GC snmp-server view Creates or updates a Simple Network GC Management Protocol (SNMP) server view entry. SSH Command Description Mode* crypto key generate dsa Generates DSA key pairs for the switch. GC snmp-server group Configures a new SNMP group or... Mode* snmp-server filter Creates or updates an SNMP server filter entry. GC crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration GC mode. Displays SSH public keys stored on the PE switch. GC snmp-server location Sets the system location string. SK show...
... the meaning of SNMP notifications. GC snmp-server view Creates or updates a Simple Network GC Management Protocol (SNMP) server view entry. SSH Command Description Mode* crypto key generate dsa Generates DSA key pairs for the switch. GC snmp-server group Configures a new SNMP group or... Mode* snmp-server filter Creates or updates an SNMP server filter entry. GC crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration GC mode. Displays SSH public keys stored on the PE switch. GC snmp-server location Sets the system location string. SK show...
Command Line Interface Guide
Page 129
...L Displays the state of syslog messages. PE Command Groups 129 PE user-key Specifies which SSH public key is manually SP configured and enters the SSH public key-string configuration command. Controls error messages logging. GC Specifies the port number of logging...cli-command logging logging buffered logging console logging facility logging file logging on port show logging show logging file show ip ssh Displays the SSH server configuration. L Specifies the importance level of the logging messages. Displays the syslog servers settings. Clears messages from...
...L Displays the state of syslog messages. PE Command Groups 129 PE user-key Specifies which SSH public key is manually SP configured and enters the SSH public key-string configuration command. Controls error messages logging. GC Specifies the port number of logging...cli-command logging logging buffered logging console logging facility logging file logging on port show logging show logging file show ip ssh Displays the SSH server configuration. L Specifies the importance level of the logging messages. Displays the syslog servers settings. Clears messages from...
Command Line Interface Guide
Page 144
... Policy-class mode to attach or remove a diffserv class from a policy and to configure an loopback type interface. • SSH Public Key-chain - The Global Configuration mode command interface ethernet enters the Interface Configuration mode to manage loopback interfaces. Contains commands...matching commands. Contains commands to a port-channel. Contains commands to configure port-channels, i.e., assigning ports to manually specify other switch SSH public keys. The Global Configuration mode command interface port-channel is used to enter the Port Channel mode. • Tunnel - ...
... Policy-class mode to attach or remove a diffserv class from a policy and to configure an loopback type interface. • SSH Public Key-chain - The Global Configuration mode command interface ethernet enters the Interface Configuration mode to manage loopback interfaces. Contains commands...matching commands. Contains commands to a port-channel. Contains commands to configure port-channels, i.e., assigning ports to manually specify other switch SSH public keys. The Global Configuration mode command interface port-channel is used to enter the Port Channel mode. • Tunnel - ...
Command Line Interface Guide
Page 148
... KeyChain From Global Configuration mode, use the exit command, or press + to Global Configuration mode, use the crypto key pubkeychain ssh command. console(configpubkey-chain)# To exit to Privileged EXEC mode. Chain pubkey-key)# mode, use the exit command, or press + to ...user- TACACS From Global Configuration mode, use the exit command, or press + to Global Configuration mode, use the tacacs-server host command. SSH Public Key String From the SSH console(config- console(tacacs)# To exit to Privileged EXEC mode. 148 Using the CLI key {rsa|dsa} command.
... KeyChain From Global Configuration mode, use the exit command, or press + to Global Configuration mode, use the crypto key pubkeychain ssh command. console(configpubkey-chain)# To exit to Privileged EXEC mode. Chain pubkey-key)# mode, use the exit command, or press + to ...user- TACACS From Global Configuration mode, use the exit command, or press + to Global Configuration mode, use the tacacs-server host command. SSH Public Key String From the SSH console(config- console(tacacs)# To exit to Privileged EXEC mode. 148 Using the CLI key {rsa|dsa} command.
Command Line Interface Guide
Page 167
Since the serial interface requires a physical connection for SSH locally. • The serial session defaults to delete the last level 15 account. CLI prevents the user from which the user may create as many a ... address for the switch. • The CLI is accessible from a secure shell interface. • The CLI generates keys for access, it is accessible through Telnet, SSH, Serial Interfaces The CLI is used if all else fails. CLI through a local serial interface, a remote telnet, or secure shell sessions. The following rules and...
Since the serial interface requires a physical connection for SSH locally. • The serial session defaults to delete the last level 15 account. CLI prevents the user from which the user may create as many a ... address for the switch. • The CLI is accessible from a secure shell interface. • The CLI generates keys for access, it is accessible through Telnet, SSH, Serial Interfaces The CLI is used if all else fails. CLI through a local serial interface, a remote telnet, or secure shell sessions. The following rules and...
Command Line Interface Guide
Page 168
...of the switch. Level 1 has read information but not configure the switch. Two vendor specific options are CISCO-AV-Pairs(Shell:priv-lvl=x) and Dell Radius VSA (user-group=x). This level has full access to a local serial port even if the remote authentication server(s) are down . TACACS+ ...the CLI when the user is the special access level assigned to read -only access. If the user is authenticated through a telnet or an SSH session. • The CLI always allows the user to configure primary and secondary authentication servers. • The user password is given an ...
...of the switch. Level 1 has read information but not configure the switch. Two vendor specific options are CISCO-AV-Pairs(Shell:priv-lvl=x) and Dell Radius VSA (user-group=x). This level has full access to a local serial port even if the remote authentication server(s) are down . TACACS+ ...the CLI when the user is the special access level assigned to read -only access. If the user is authenticated through a telnet or an SSH session. • The CLI always allows the user to configure primary and secondary authentication servers. • The user password is given an ...
Command Line Interface Guide
Page 170
..., the CLI records the last 1000 security log records in this protocol. The security log record contains the following : • Telnet. • SSH and the keying information to use for SSH. • HTTP. • HTTPS and the security certificate to be used . The user defines a management profile, which the user is connecting...
..., the CLI records the last 1000 security log records in this protocol. The security log record contains the following : • Telnet. • SSH and the keying information to use for SSH. • HTTP. • HTTPS and the security certificate to be used . The user defines a management profile, which the user is connecting...
Command Line Interface Guide
Page 190
... Mode Global Configuration mode User Guidelines The default and optional list names created with the aaa authentication enable command are used by console, telnet, and SSH and only contains the method none. Specify at least one from the following table: Keyword enable line none radius tacacs Source or destination Uses the...
... Mode Global Configuration mode User Guidelines The default and optional list names created with the aaa authentication enable command are used by console, telnet, and SSH and only contains the method none. Specify at least one from the following table: Keyword enable line none radius tacacs Source or destination Uses the...
Command Line Interface Guide
Page 192
... Commands "networkList" is used if the RADIUS server is used to name this list. Uses no authentication is any character string used by telnet and SSH and only contains the method local. The method argument identifies the list of all RADIUS servers for authentication. For example, if none is specified as...
... Commands "networkList" is used if the RADIUS server is used to name this list. Uses no authentication is any character string used by telnet and SSH and only contains the method local. The method argument identifies the list of all RADIUS servers for authentication. For example, if none is specified as...
Command Line Interface Guide
Page 197
... database is down. Example The following table: Keyword local none radius tacacs Source or destination Uses the local username database for a line (console, telnet, or SSH). If none is specified as an authentication method after radius, no authentication is used only if the previous method returns an error, not if it...
... database is down. Example The following table: Keyword local none radius tacacs Source or destination Uses the local username database for a line (console, telnet, or SSH). If none is specified as an authentication method after radius, no authentication is used only if the previous method returns an error, not if it...
Command Line Interface Guide
Page 201
Syntax show users accounts command in Privileged EXEC mode to display information about the local user database. enableList : local Line Login Method List Console defaultList Telnet defaultList SSH defaultList Enable Method List enableList enableList enableList HTTPS HTTP DOT1X :local :local :none show users accounts Use the show users accounts [long] Default Configuration This command has no user guidelines. AAA Commands 201 Command Mode Privileged EXEC mode User Guidelines This command has no default configuration.
Syntax show users accounts command in Privileged EXEC mode to display information about the local user database. enableList : local Line Login Method List Console defaultList Telnet defaultList SSH defaultList Enable Method List enableList enableList enableList HTTPS HTTP DOT1X :local :local :none show users accounts Use the show users accounts [long] Default Configuration This command has no user guidelines. AAA Commands 201 Command Mode Privileged EXEC mode User Guidelines This command has no default configuration.
Command Line Interface Guide
Page 203
... Jan 19 2005 08:23:48 Bob Serial Jan 19 2005 08:29:29 Robert HTTP 172.16.0.8 Jan 19 2005 08:42:31 John SSH 172.16.0.1 Jan 19 2005 08:49:52 Betty Telnet 172.16.1.7 username Use the username command in Global Configuration mode to add a new user...
... Jan 19 2005 08:23:48 Bob Serial Jan 19 2005 08:29:29 Robert HTTP 172.16.0.8 Jan 19 2005 08:42:31 John SSH 172.16.0.1 Jan 19 2005 08:49:52 Betty Telnet 172.16.1.7 username Use the username command in Global Configuration mode to add a new user...
Command Line Interface Guide
Page 1053
... Commands • PHY Diagnostics Commands • Power Over Ethernet Commands • RMON Commands • Serviceability Tracing Packet Commands • Sflow Commands • SNMP Commands • SSH Commands • Syslog Commands • System Management Commands • Telnet Server Commands • User Interface Commands • Web Server Commands Autoconfig Commands This chapter explains...
... Commands • PHY Diagnostics Commands • Power Over Ethernet Commands • RMON Commands • Serviceability Tracing Packet Commands • Sflow Commands • SNMP Commands • SSH Commands • Syslog Commands • System Management Commands • Telnet Server Commands • User Interface Commands • Web Server Commands Autoconfig Commands This chapter explains...
Command Line Interface Guide
Page 1113
...://username@ipaddr/filepath/filename | hostname | copy ftp ftp://ipaddr/filepath/filename image} • source-url - The user name for logging into the remote server via SSH. Configuration and Image File Commands 1113 The URL or reserved keyword of the server. (Range: 1-158 characters) • filepath - The path to a destination. The following...
...://username@ipaddr/filepath/filename | hostname | copy ftp ftp://ipaddr/filepath/filename image} • source-url - The user name for logging into the remote server via SSH. Configuration and Image File Commands 1113 The URL or reserved keyword of the server. (Range: 1-158 characters) • filepath - The path to a destination. The following...
Command Line Interface Guide
Page 1146
Virtual terminal for remote console access (Telnet). • ssh - Examples The following example configures the command history buffer size to 20 commands for configuration and enter the line configuration command mode. ...User Guidelines This command has no user guidelines. Command Mode Line Configuration mode User Guidelines This command has no user guidelines. Syntax line {console|telnet|ssh} • console - Example The following example enters Line Configuration mode to identify a specific line for the current terminal session. Default Configuration This command...
Virtual terminal for remote console access (Telnet). • ssh - Examples The following example configures the command history buffer size to 20 commands for configuration and enter the line configuration command mode. ...User Guidelines This command has no user guidelines. Command Mode Line Configuration mode User Guidelines This command has no user guidelines. Syntax line {console|telnet|ssh} • console - Example The following example enters Line Configuration mode to identify a specific line for the current terminal session. Default Configuration This command...
Command Line Interface Guide
Page 1147
... line parameters. Console terminal line. • telnet - Virtual terminal for remote console access (Telnet). • ssh - console(config-line)# show line Use the show line [console|telnet|ssh] • console - Virtual terminal for secured remote console access (SSH). console>show line Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600 Databits: 8 Parity: none...
... line parameters. Console terminal line. • telnet - Virtual terminal for remote console access (Telnet). • ssh - console(config-line)# show line Use the show line [console|telnet|ssh] • console - Virtual terminal for secured remote console access (SSH). console>show line Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600 Databits: 8 Parity: none...