Cee Cli Keyboard Shortcuts; Table 5 Cee Cli Keyboard Shortcuts - Brocade Communications Systems Converged Enhanced Ethernet 8000 Administrator's Manual

Converged enhanced ethernet
Hide thumbs Also See for Converged Enhanced Ethernet 8000:
Table of Contents

Advertisement

TABLE 4
CEE CLI command modes (Continued)
Command
Prompt
mode
Feature
CEE map:
configuration
switch(config-ceemap)#
Standard ACL:
switch(conf-macl-std)#
Extended ACL:
switch(conf-macl-ext)#
Console and
switch(config-line)#
VTY (line)
configuration
NOTE
Pressing Ctrl+Z or entering the end command in any mode returns you to privileged EXEC mode.
Entering exit in any mode returns you to the previous mode.

CEE CLI keyboard shortcuts

Table 5
TABLE 5
Keystroke
Ctrl+B or the left arrow key
Ctrl+F or the right arrow key
Ctrl+A
Ctrl+E
Esc B
Esc F
Ctrl+Z
Ctrl+P or the up arrow key
Ctrl+N or the down arrow key
Converged Enhanced Ethernet Administrator's Guide
53-1002163-02
DRAFT: BROCADE CONFIDENTIAL
lists CEE CLI keyboard shortcuts.
CEE CLI keyboard shortcuts
CEE Command Line Interface
How to access the command mode
From the global configuration mode,
specify a CEE feature by entering
one of the following commands:
cee-map
mac access-list
From the global configuration mode,
configure a terminal connected
through the console port by entering
the line console command.
Configure a terminal connected
through a Telnet session by entering
the line vty command.
Description
Moves the cursor back one character.
Moves the cursor forward one character.
Moves the cursor to the beginning of the command line.
Moves the cursor to the end of the command line.
Moves the cursor back one word.
Moves the cursor forward one word.
Returns to privileged EXEC mode.
Displays commands in the history buffer with the most recent command
displayed first.
Displays commands in the history buffer with the most recent command
displayed last.
Description
Access and configure CEE features.
Identify traffic based on the MAC
addresses, such as VLAN IDs and
different encapsulations.
Standard Access Control Lists filter
the traffic on a source address and
block traffic close to a destination.
Extended Access Control Lists block
traffic based on any given packet
attribute.
Configure a terminal connected
through the console port or a
terminal connected through a Telnet
session.
After you apply the access list to an
interface, a Virtual Teletype (VTY), or
through a command using the
access list keyword, it becomes
effective.
2
17

Advertisement

Table of Contents
loading

Table of Contents