Introduction
37 Cisco Sx350 Ph. 2.2.5 Devices - Command Line Interface Reference Guide
1
Copying and Pasting Text
Up to 1000 lines of text (or commands) can be copied and pasted into the device.
NOTE It is the user’s responsibility to ensure that the text copied into the device consists
of legal commands only.
When copying and pasting commands from a configuration file, make sure that the
following conditions exist:
• A device Configuration mode has been accessed.
The commands contain no encrypted data, like encrypted passwords or keys.
Encrypted data cannot be copied and pasted into the device except for encrypted
passwords where the keyword encrypted is used before the encrypted data (for
instance in the enable password command).
Interface Naming Conventions
Interfaces on the device can be one of the following types:
• Fast Ethernet (10/100 kbits) ports—This can be written as FastEthernet,
fa or fe.
• Gigabit Ethernet (10/100/1000 kbits) ports—These can be written as
either GigabitEthernet or gi or GE.
• —LAG (Port Channel)—Written as either Port-Channel or po.
• VLAN—Written as VLAN
• Tunnel—Written as tunnel or tu
Ctrl+E Moves the cursor to the end of the command line.
Ctrl+Z / End Returns back to the Privileged EXEC mode from
any configuration mode.
Backspace Deletes one character left to the cursor position.
Keyboard Key
Description