EasyManuals Logo

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X User Manual

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
640 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #335 background imageLoading...
Page #335 background image
You cannot use wildcards.
You cannot create or copy over files generated by the system; however, you can
copy such files to an unreserved filename.
Examples
host1#copy host1:westford.cnf boston.cnf
host1#copy /incoming/releases/2-8-0a3-7.rel 2-8-0a3-7.rel
host1#copy /shconfig.txt ftp://joe:passwd@173.28.32.156/ftpDir
/results/shConfigJoe.txt
There is no no version.
See copy.
host
Use to add or modify an entry to the host table. You can enter the optional
username and password in plain text (unencrypted). Or, if you know the correct
encrypted forms of the username and password, you can enter the encrypted
forms (see below).
This command supports both IPv4 and IPv6 address formats.
This command allows network files to be accessible from a host.
This command supports both FTP and TFTP for copying and redirecting files.
You cannot invent an encrypted string to be used with the algorithm 8 option.
You must use plain text (unencrypted) strings for the initial configuration. The
only way to obtain a valid encrypted string is to enable password encryption (by
issuing the service password-encryption command) and then examine the
output of the show configuration command. Username and password encryption
is made available primarily so that scripts generated from the show
configuration output can be saved, used, and transferred without fear of
password exposure.
Example
host1(config)#host westford 10.10.8.7 ftp user25 easy53
To determine the encrypted values for usernames and passwords entered in
cleartext, you must do the following:
1. Issue the service password-encryption command. This causes subsequently
issued show configuration commands to generate encrypted forms of the
username and password for this command, as well as for all other commands
that support encryption. See Managing the System on page 251, for more
information about the service password-encryption command.
2. Issue the show configuration command and search for the host command.
The encrypted forms are preceded by the number 8.
3. You can copy and paste the command showing the encrypted forms into a
macro or script to use as desired. Specify the number 8 before the username
and before the password to enter an encrypted value.
Example for encrypted values
Transferring Files 305
Chapter 5: Managing the System

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X and is the answer not in the manual?

Juniper SYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X Specifications

General IconGeneral
BrandJuniper
ModelSYSTEM BASICS - CONFIGURATION GUIDE V 11.1.X
CategorySoftware
LanguageEnglish

Related product manuals