this case, the CLI suppresses repeated events from the same source and
instead the CLI records one event within a period of time and includes that
count as part of the log.
In addition to user access control, the system also manages access for in-band
interfaces. The system allows individual hosts or subnets to access only
specific management protocols.
The user defines a management profile, which identifies management
protocols such as the following:
SSH and the keying information to use for SSH.
HTTPS and the security certificate to be used.
SNMPv1/v2c and the read and read/write community strings to be used.
SNMPv3 and the security information for used this protocol.
For each of these management profiles, the user defines the list of hosts or
subnets from which the management profiles may be used.
Other CLI Tools and Capabilities
The CLI has several other capabilities associated with its primary functions.
The terminal width and length for CLI displays is 79 characters and 25 lines,
respectively. The length setting is used to control the number of lines the CLI
will display before it pauses. For example, the CLI pauses at 24 lines and
prompts the user with the
the user to press either <q> or any other key. If the user presses any key
except <q>, the CLI shows the next page. A <q> key stops the display and
returns to the CLI prompt.
The boot message is a system message that is not user-configurable and is
displayed when the system is booting. Displayed information includes the
prompt on the 25th line. The CLI waits for
Using the CLI