JunosE 11.3.x System Basics Configuration Guide
host
292
Specify a subdirectory name to create a subdirectory within the incoming or outgoing
directory in the user space.
You cannot use wildcards.
You cannot create or copy over files generated by the system; however, you can copy
such files to an unreserved filename.
Examples
host1#copy host1:westford.cnf boston.cnf
host1#copy /incoming/releases/2-8-0a3-7.rel 2-8-0a3-7.rel
host1#copy /shconfig.txt ftp://joe:passwd@173.28.32.156/ftpDir
/results/shConfigJoe.txt
There is no no version.
See copy.
Use to add or modify an entry to the host table. You can enter the optional username
and password in plain text (unencrypted). Or, if you know the correct encrypted forms
of the username and password, you can enter the encrypted forms (see below).
This command supports both IPv4 and IPv6 address formats.
This command allows network files to be accessible from a host.
This command supports both FTP and TFTP for copying and redirecting files.
You cannot invent an encrypted string to be used with the algorithm 8 option. You
must use plain text (unencrypted) strings for the initial configuration. The only way to
obtain a valid encrypted string is to enable password encryption (by issuing the service
password-encryption command) and then examine the output of the show
configuration command. Username and password encryption is made available
primarily so that scripts generated from the show configuration output can be saved,
used, and transferred without fear of password exposure.
Example
host1(config)#host westford 10.10.8.7 ftp user25 easy53
To determine the encrypted values for usernames and passwords entered in cleartext,
you must do the following:
Issue the service password-encryption command. This causes subsequently issued
1.
show configuration commands to generate encrypted forms of the username and
password for this command, as well as for all other commands that support
encryption. See "Managing the System" on page 239, for more information about the
service password-encryption command.
Issue the show configuration command and search for the host command. The
2.
encrypted forms are preceded by the number 8.
You can copy and paste the command showing the encrypted forms into a macro
3.
or script to use as desired. Specify the number 8 before the username and before
the password to enter an encrypted value.
Copyright © 2010, Juniper Networks, Inc.
Need help?
Do you have a question about the JUNOSE SOFTWARE FOR E SERIES 11.3.X - SYSTEM BASICS CONFIGURATION GUIDE 2010-10-04 and is the answer not in the manual?