3com S7906E 설치 설명서

다운로드
페이지 2621
 
1-14 
  ping     Ping function 
  quit     Exit from current command view 
  ssh2     Establish a secure shell client connection 
  super    Set the current user priority level 
  telnet   Establish one TELNET connection 
  tracert  Trace route function 
After you set the user privilege level under the user interface, users can log in to the device through 
Telnet without any authentication and use the following commands: 
<Sysname> ? 
User view commands: 
  cluster        Run cluster command 
  debugging      Enable system debugging functions 
  display        Display current system information 
  ipc            Interprocess communication 
  ping           Ping function 
  quit           Exit from current command view 
  refresh        Do soft reset 
  reset          Reset operation 
  screen-length  Specify the lines displayed on one screen 
  send           Send information to other user terminal interface 
  ssh2           Establish a secure shell client connection 
  super          Set the current user priority level 
  telnet         Establish one TELNET connection 
  terminal       Set the terminal line characteristics 
  tracert        Trace route function 
  undo           Cancel current setting 
Authenticate the users logging in to the device through Telnet, verify their passwords, and specify 
the user privilege levels as 2. 
<Sysname> system-view 
[Sysname] user-interface vty 0 4 
[Sysname-ui-vty0-4] authentication-mode password 
[Sysname-ui-vty0-4] set authentication password cipher 123 
[Sysname-ui-vty0-4] user privilege level 2 
By default, when users log in to the device through Telnet, they can use the commands of level 0 after 
passing the authentication. After you set the user privilege level under the user interface, when users 
log in to the device through Telnet, they need to input password 123, and then they can use commands 
of levels 0, 1, and 2. 
Configuring user privilege level switch 
Users can switch their user privilege level temporarily without logging out and disconnecting the current 
connection; after the switch, users can continue to configure the device without the need of re-login and 
re-authentication, but the commands that they can execute have changed. For example, if the current 
user privilege level is 3, the user can configure system parameters; after switching the user privilege 
level to 0, the user can only execute some simple commands, like ping and tracert, and only a few 
display commands. The switching of user privilege level is effective for the current login; after the user 
re-logs in, the user privilege restores to the original level.