Cisco Cisco Packet Data Gateway (PDG)
Global Configuration Mode Commands (T-threshold phspc)
tech-support test-commands password ▀
Command Line Interface Reference, StarOS Release 16 ▄
5435
tech-support test-commands password
Configures the password that protects access to the
cli test-commands
mode in the Exec mode and Global
Configuration mode. This command is only visible to a user logged in as a Security Administrator.
Product
All
Privilege
Security Administrator
Caution:
The cli test-commands are for use by or under the supervision of Cisco TAC.
Mode
Exec > Global Configuration
configure
Entering the above command sequence results in the following prompt:
[local]host_name(config)#
Syntax
tech-support test-commands [encrypted] password password
no tech-support test-commands password
no
Disables the use of a test-commands password. All subsequent attempts to execute
cli test-commands
in
Exec or Global Configuration modes will fail.
Default: no password, access disabled
Default: no password, access disabled
[encrypted]
If this optional keyword is specified, the <password> argument is interpreted as an encrypted string
containing the password value. If the encrypted keyword is not specified, then the <password> argument is
interpreted as the actual plain text value. In the output of
containing the password value. If the encrypted keyword is not specified, then the <password> argument is
interpreted as the actual plain text value. In the output of
show configuration
and
save
configuration
commands, only the encrypted option of this command syntax appears.
password
Specifies the password to be used when executing the
cli test-commands
command in Exec or Global
Configuration modes. For a plain text password,
password
is an alphanumeric string of 1 through 64
characters. For an encrypted password,
password
is an alphanumeric string of 1 through 524 characters.
If a password is not entered via this command, the
cli test-commands
command remains disabled in the
Exec and Global Configuration modes.
Default: no password, access disabled
Default: no password, access disabled
Important:
An SNMP trap is generated when an administrator enters or edits a password via this command
(starTechSupportPasswordChanged). Refer to the SNMP MIB Reference for additional information.