Command Line View - 3Com 7700 Configuration Manual

Hide thumbs Also See for 7700:
Table of Contents

Advertisement

20
C
1: S
A
HAPTER
YSTEM
CCESS

Command Line View

Network test commands, such as Tracert and Ping, for rapid troubleshooting of
the network.
Detailed debugging information to help with network troubleshooting.
Ability to log in and manage other Ethernet switches directly, using the telnet
command.
FTP service for the users to upload and download files.
A function similar to Doskey to execute a history command.
The command line interpreter that searches for a target not fully matching the
keywords. You can enter the whole keyword or part of it, as long as it is unique
and not ambiguous.
The Switch 7700 provides hierarchy protection for the command lines to prevent
unauthorized users from accessing the switch illegally.
There are four levels of commands:
Visit level — involves commands for network diagnosis tools (such as ping and
tracert), command of the switch between different language environments of
user interface (language-mode) and the telnet command. Saving the
configuration file is not allowed on this level of commands.
Monitoring level — includes the display command and the debugging
command for system maintenance, service fault diagnosis, and so on. Saving
the configuration file is not allowed on this level of commands.
Configuration level — provides service configuration commands, such as the
routing command and commands on each network layer that are used to
provide direct network service to the user.
Management level — influences the basic operation of the system and the
system support module which plays a support role for service. Commands at
this level involve file system commands, FTP commands, TFTP commands,
XModem downloading commands, user management commands, and level
setting commands.
Login users are also classified into four levels that correspond to the four
command levels. After users of different levels log in, they can only use commands
at their own, or lower, levels.
To prevent unauthorized users from illegal intrusion, users are identified when
switching from a lower level to a higher level with the super [ level ] command.
User ID authentication is performed when users at a lower level switch to users at
a higher level. Only when correct password is entered three times, can the user
switch to the higher level. Otherwise, the original user level remains unchanged.
Command views are implemented according to requirements that are related to
one another. For example, after logging in to the Ethernet switch, you enter user
view, in which you can only use some basic functions,such as displaying the
running state and statistics information. In user view, key in system-view to enter
system view, in which you can key in different configuration commands and enter
the corresponding views.

Advertisement

Table of Contents
loading

Table of Contents