i
Contents
Using the CLI ··················································································1
CLI views ··································································································································· 1
Entering system view from user view························································································· 2
Returning to the upper-level view from any view ·········································································· 2
Returning to user view ············································································································ 2
Accessing the CLI online help········································································································· 2
Using the undo form of a command ································································································· 3
Entering a command····················································································································· 3
Editing a command line ·········································································································· 3
Entering a text or string type value for an argument ····································································· 4
Abbreviating commands ········································································································· 4
Configuring and using command aliases ···················································································· 4
Configuring and using command hotkeys ··················································································· 5
Enabling redisplaying entered-but-not-submitted commands ························································· 6
Understanding command-line error messages ··················································································· 7
Using the command history function ································································································ 7
Command buffering rules ········································································································ 8
Repeating commands in the command history buffer for a line ······················································· 8
Controlling the CLI output ·············································································································· 9
Pausing between screens of output ·························································································· 9
Numbering each output line from a display command ··································································· 9
Filtering the output from a display command ············································································· 10
Saving the output from a display command to a file···································································· 12
Viewing and managing the output from a display command effectively ·········································· 13
Saving the running configuration ··································································································· 13
Login overview ·············································································· 14
Logging in through the console port for the first device access ················· 15
Logging in to the CLI ······································································· 17
CLI overview ····························································································································· 17
User lines ·························································································································· 17
Login authentication modes ··································································································· 18
User roles ·························································································································· 18
FIPS compliance ························································································································ 18
Logging in through the console port locally ······················································································ 19
Disabling authentication for console login················································································· 19
Configuring password authentication for console login ································································ 20
Configuring scheme authentication for console login ·································································· 20
Configuring common AUX line settings ···················································································· 21
Logging in through Telnet ············································································································ 22
Configuring Telnet login on the device ····················································································· 23
Using the device to log in to a Telnet server ············································································· 27
Logging in through SSH ·············································································································· 28
Configuring the device as an SSH server ················································································· 28
Using the device to log in to an SSH server ·············································································· 30
Logging in through a pair of modems ····························································································· 30
Displaying and maintaining CLI login ····························································································· 33
Accessing the device through SNMP ·················································· 35
Controlling user access ··································································· 36
FIPS compliance ························································································································ 36
Controlling Telnet/SSH logins ······································································································· 36
Configuration procedures ······································································································ 36
Configuration example ········································································································· 36