用户手册目录Title Page1Contents3CLI configuration8What is CLI?8Entering the CLI8Command conventions8Undo form of a command9CLI view description9Entering system view10Exiting the current view10Returning to user view11Using the CLI online help11Typing commands12Editing command lines12Typing incomplete keywords12Configuring command aliases13Configuring CLI hotkeys13Redisplaying input but not submitted commands15Checking command-line errors15Using command history15Accessing history commands16Configuring the history buffer size16Controlling the CLI display17Multi-screen display17Controlling multi-screen display17Disabling multi-screen display17Filtering output information17Introduction17Example of filtering output information19Configuring user privilege and command levels20Introduction20Configuring a user privilege level21Configure user privilege level by using AAA authentication parameters21Example of configuring a user privilege level by using AAA authentication parameters21Configure the user privilege level under a user interface22Example of configuring a user privilege level under a user interface23Switching user privilege level23Introduction23Setting the authentication mode for user privilege level switch24Switching the user privilege level25Modifying the level of a command26Saving the current configuration27Displaying and maintaining CLI27Login methods28Login methods28User interface overview29Users and user interfaces29Numbering user interfaces29Absolute numbering29Relative numbering30CLI login31Overview31Logging in through the console port31Introduction31Configuration requirements31Login procedure32Console login authentication modes34Configuring none authentication for console login35Configuration prerequisites35Configuration procedure36Configuring password authentication for console login36Configuration prerequisites36Configuration procedure37Configuring scheme authentication for console login38Configuration prerequisites38Configuration procedure38Configuring common settings for console login (optional)41Logging in through Telnet43Introduction43Telnet login authentication modes44Configuring none authentication for Telnet login45Configuration prerequisites45Configuration procedure45Configuring password authentication for Telnet login46Configuration prerequisites46Configuration procedure46Configuring scheme authentication for Telnet login48Configuration prerequisites48Configuration procedure48Configuring common settings for VTY user interfaces (optional)52Configuring the device to log in to a Telnet server as a Telnet client53Configuration prerequisites53Configuration procedure54Logging in through SSH54Introduction54Configuring the SSH server55Configuration prerequisites55Configuration procedure55Configuring the SSH client to log in to the SSH server58Configuration prerequisites58Configuration procedure58Logging in through modems59Introduction59Configuration requirements59Login procedure59Modem login authentication modes62Configuring none authentication for modem login63Configuration prerequisites63Configuration procedure63Configuring password authentication for modem login64Configuration prerequisites64Configuration procedure64Configuring scheme authentication for modem login65Configuration prerequisites65Configuration procedure66Configuring common settings for modem login (optional)69Displaying and maintaining CLI login71Web login73Web login overview73Configuring HTTP login73Configuring HTTPS login74Displaying and maintaining web login77Web login example77HTTP login example77Network requirements77Configuration procedure77HTTPS login example78Network requirements78Configuration procedure79NMS login81NMS login overview81Configuring NMS login81NMS login example82User login control85User login control methods85Configuring login control over Telnet users85Configuration preparation85Configuring source IP-based login control over Telnet users85Configuring source and destination IP-based login control over Telnet users86Configuring source MAC-based login control over Telnet users86Source MAC-based login control configuration example87Network requirements87Configuration procedure87Configuring source IP-based login control over NMS users88Configuration preparation88Configuring source IP-based login control over NMS users88Source IP-based login control over NMS users configuration example89Network requirements89Configuration procedure89Configuring source IP-based login control over web users90Configuration preparation90Configuring source IP-based login control over web users90Logging off online web users90Source IP-based login control over web users configuration example91Network requirements91Configuration procedure91FTP configuration92FTP overview92Introduction to FTP92FTP operation92Configuring the FTP client93Establishing an FTP connection93Operating the directories on an FTP server94Operating the files on an FTP server95Using another username to log in to an FTP server96Maintaining and debugging an FTP connection96Terminating an FTP connection96FTP client configuration example97Network requirements97Configuration procedure97Configuring the FTP server98Configuring FTP server operating parameters98Configuring authentication and authorization on the FTP server99FTP server configuration example100Network requirements100Configuration procedure100Displaying and maintaining FTP102TFTP configuration103TFTP overview103Introduction to TFTP103TFTP operation103Configuring the TFTP client104Displaying and maintaining the TFTP client105TFTP client configuration example105Network requirements105Configuration procedure106File management107Managing files107Filename formats107Performing directory operations107Displaying directory information108Displaying the current working directory108Changing the current working directory108Creating a directory108Removing a directory108Performing file operations108Displaying file information109Displaying the contents of a file109Renaming a file109Copying a file109Moving a file109Deleting a file109Restoring a file from the recycle bin110Emptying the recycle bin110Performing batch operations110Performing storage medium operations111Managing the space of a storage medium111Setting prompt modes111Example for file operations111Configuration file management113Configuration file overview113Types of configuration113Factory defaults113Startup configuration113Running configuration113Format and content of a configuration file113Coexistence of multiple configuration files114Startup with the configuration file114Saving the running configuration114Introduction114Modes in saving the configuration114Setting configuration rollback115Configuration rollback115Configuration task list116Configuring parameters for saving the running configuration116Enabling automatic saving of the running configuration117Manually saving the running configuration117Setting configuration rollback118Specifying a startup configuration file to be used at the next system startup118Backing up the startup configuration file119Deleting a startup configuration file119Restoring a startup configuration file120Displaying and maintaining a configuration file120Software upgrade configuration122Switch software overview122Software upgrade methods122Upgrading the Boot ROM program through a system reboot123Upgrading system software through a system reboot124Software upgrade by installing hotfixes124Basic concepts in hotfix124Patch and patch file124Incremental patch124Common patch and temporary patch125Patch status125IDLE state125DEACTIVE state126ACTIVE state126RUNNING state127Configuration prerequisites127One-step patch installation128Step-by-step patch installation128Step-by-step patch uninstallation129Displaying and maintaining the software upgrade130Software upgrade configuration examples130Scheduled upgrade configuration example130Network requirement130Configuration procedure130Hotfix configuration example132Network requirements132Configuration procedure132Device management133Configuring the device name133Changing the system time133Configuration guidelines133Configuration procedure136Enabling displaying the copyright statement136Configuring banners137Introduction to banners137Banner types137Message input modes137Configuration procedure138Banner configuration examples138Configuring the exception handling method138Rebooting the device139Rebooting the device immediately at the CLI139Scheduling a device reboot139Scheduling jobs140Job configuration approaches140Configuration guidelines140Scheduling a job in the non-modular approach141Scheduling a job in the modular approach141Disabling Boot ROM access141Configuring the detection timer142Configuring temperature alarm thresholds (available only on the A3100 v2 EI)142Clearing idle 16-bit interface indexes143Verifying and diagnosing transceiver modules143Verifying transceiver modules143Diagnosing transceiver modules144Displaying and maintaining device management configuration144Automatic configuration147Automatic configuration overview147Typical automatic configuration network147How automatic configuration works148Work flow of automatic configuration148Using DHCP to obtain an IP address and other configuration information149Address acquisition process149Principles for selecting an address pool on the DHCP server149Obtaining the configuration file from the TFTP server150File types150Obtaining the configuration file151TFTP request sending mode151Executing the configuration file152Support and other resources153Contacting HP153Subscription service153Related information153Documents153Websites153Conventions154Command conventions154GUI conventions154Symbols154Network topology icons154Port numbering in examples155Index156文件大小: 1.7 MB页数: 157Language: English打开用户手册