|
To enable enhanced editing mode for a particular line, use the editing line configuration command. To disable the enhanced editing mode, use the no form of this command.
This command has no arguments or keywords.
Table 5-1 provides a description of the keys used to enter and edit commands. The letters Ctrl indicates the Control key. It must be pressed simultaneously with its associated letter key. The letters Esc indicates the Escape key. It must be pressed first, followed by its associated letter key. Keys are case sensitive.
Table 5-1 Editing Keys and Functions
1The arrow keys function only with ANSI-compatible terminals. |
In the following example, enhanced editing mode is disabled on line 3.
terminal editing
To enter privileged EXEC mode, use the enable EXEC command.
Because many of the privileged commands set operating parameters, privileged access should be password-protected to prevent unauthorized use. If the system administrator has set a password with the enable password global configuration command, you are prompted to enter it before being allowed access to privileged EXEC mode. The password is case sensitive.
If a password has not been set, it is only possible to us the enable command when using the console line. If a level is not specified, it defaults to the privileged EXEC mode, which is level 15.
In the following example, the user enters the enable command and is prompted to enter a password. The password is not displayed on the screen. After the user enters the correct password, the system enters privileged command mode as indicated by the pound sign (#).
To specify what happens if the TACACS and extended TACACS servers used by the enable command do not respond, use the enable last-resort global configuration command. The no form of this command restores the default.
The secondary authentication is used only if the first attempt fails. The secondary authentication does not occur if the first authentication is only unsuccessful.
Note This command is not used in AAA/TACACS+, which takes the aaa authentication suite of commands instead.
In the following example, if the TACACS servers do not respond to the enable command, the user can enable the system by entering the privileged level password.
To configure the enable password for a given level, use the enable password global configuration command. To remove the enable password for a given level, use the no form of this command.
Use this command with the level option to define a privilege level. Once the level and the password are specified, give the password to the users who can have access at this level. Use the privilege level (global) configuration command to specify the commands that are accessible at the specified level.
You do not ordinarily enter an encryption type. Typically, you only enter an encryption type if you cut and paste a password that is already encrypted by the system back into this command.
Enable or disable password encryption with the service password-encryption command. If you enter a value for the encryption-type argument but have not enabled encryption, the encryption type is treated as part of the password.
An enable password can contain from 1 to 80 uppercase and lowercase alphanumeric characters, but that the first character cannot be a number. Some spaces are valid password characters; for example, "two words" is valid. Leading spaces are ignored, but trailing spaces are recognized. For example, "woolly " is interpreted as "woolly " (with the space). On the other hand, "woolly" is interpreted as "woolly" (without the space). To create an enable password containing a question mark (?), precede the question mark with keystrokes ^V. For example, to create the password "abc?123", enter the letters abc followed by ^V followed by? followed by the numbers 123. When the system prompts you to enter the enable password, you do not need to precede the question mark with the ^V. For example, you can simply enter abc?123 at the password prompt.
In the following example, the password pswd2 is enabled for privilege level 2.
disable
enable
privilege level (global)
service password-encryption
show privilege
To enable use of the TACACS to determine whether a user can access the privileged command level, use the enable use-tacacs global configuration command. Use the no form of this command to disable TACACS verification.
Caution If you use the enable use-tacacs command, you must also use the tacacs-server authenticate enable command to avoid being locked out of the switch. |
This command has no arguments or keywords.
When you add this command to the configuration file, the EXEC enable command prompts for a new username and password pair. This pair is then passed to the TACACS server for authentication. If you are using extended TACACS, it also passes any existing UNIX user identification code to the server.
Note This command initializes TACACS. Use the tacacs-server extended command to initialize extended TACACS, or use the aaa new-model command to initialize AAA/TACACS+.
The following example sets TACACS verification on the privileged EXEC-level login sequence.
To exit configuration mode, use the end global configuration command.
This command has no arguments or keywords.
You can also press ^Z to exit configuration mode.
In the following example, entering the end command causes the system to exit configuration mode and return to EXEC mode.
To erase a saved configuration, use one of the following erase privileged EXEC commands. The erase startup-config command replaces the write erase command.
Syntax Description
The initial default device is slot0:. Otherwise, the default device is that specified by the cd command.
When you use the erase startup-config command, the switch erases or deletes the configuration pointed to by the config_file environment variable. The config_file environment variable specifies the configuration file used for initialization. If the config_file environment variable specifies a Flash memory device and configuration filename, the switch deletes the configuration file. That is, the switch marks the file as "deleted."
The erase [device:]filename command functions like the delete command. That is, when you erase a specific file, the system marks the file as deleted, allowing you to later undelete an erased file. See the delete and undelete commands for more information. If you omit the device, the switch uses the default device specified by the cd command.
If you attempt to erase the configuration file specified by the config_file or BOOTLDR environment variables, the system prompts you to confirm the deletion. Also, if you attempt to erase the last valid system image specified in the BOOT environment variable, the system prompts you to confirm the deletion.
Note The erase [device:]filename command differs from the erase flash command. The erase [device:]filename command erases a specified file located in internal Flash or on the Flash memory card inserted in the PCMCIA slot. The erase flash command erases internal Flash memory.
The following example deletes the myconfig file from a Flash memory card inserted in slot 0 of the ASP card.
boot config
cd
delete
show boot
show startup-config
undelete
To define a system escape character, use the escape-character line configuration command. The no form of this command sets the escape character to Break.
The Break key cannot be used as an escape character on the console terminal because the operating software interprets Break as an instruction to halt the system. To send the escape character to the other side, press Ctrl-^ twice.
The following example sets the escape character to ^P, which is ASCII character 16.
To allow an EXEC process on a line, use the exec line configuration command. The no form of this command turns off the EXEC process for the line specified.
This command has no arguments or keywords.
By default, the switch starts EXECs on all lines.
When you want to allow an outgoing connection only for a line, use the no exec command. When a user tries to use Telnet to access a line with the no exec command configured, the user gets no response when pressing the Return key at the login screen.
The following example illustrates how to turn off the EXEC on line 7. You might want to do this on the auxiliary port if the attached device (for example, the control port of a rack of modems) sends unsolicited data to the switch; an EXEC process starts, making the line unavailable.
To control whether banners are displayed or suppressed, use the exec-banner line configuration command. This command determines whether the switch displays the EXEC banner or the message-of-the-day (MOTD) banner when an EXEC is created. The no form of this command suppresses the banner messages.
This command has no arguments or keywords.
By default, the messages defined with banner motd and banner exec commands are displayed on all lines.
The following example suppresses the banner on virtual terminal lines 0 to 4.
To configure the character widths of EXEC and configuration command characters, use the exec-character-bits line configuration command.
Setting the EXEC character width to 8 allows you to use special graphical and international characters in banners, prompts, and so forth. However, setting the EXEC character width to 8 bits can cause failures. If a user on a terminal that is sending parity enters the command help, an "unrecognized command" message appears because the system is reading all 8 bits, although the eighth bit is not needed for the help command.
Note If you are using the autoselect command, set the activation-character to the default Return and exec-character-bits to the default 7. If you change these defaults, the application does not recognize the activation request.
The following example allows full 8-bit international character sets by default, except for the console, which is an ASCII terminal. It illustrates use of the default-value exec-character-bits global configuration command and the exec-character-bits line configuration command.
default-value exec-character-bits
default-value special-character-bits
special-character-bits
terminal exec-character-bits
terminal special-character-bits
To set the interval that the EXEC command interpreter waits until user input is detected, use the exec-timeout line configuration command. The no form of this command removes the timeout definition.
If no input is detected, the EXEC command resumes the current connection, or if no connections exist, it returns the terminal to the idle state and disconnects the incoming session.
The no version of this command has the same effect as the exec-timeout 0 command.
The following example sets a time interval of 2 minutes, 30 seconds.
The following example sets a time interval of 10 seconds.
To exit any command mode or close an active terminal session and terminate the EXEC, use the exit command at the system prompt.
This command has no arguments or keywords.
When you enter the exit command at the EXEC levels, the EXEC mode is ended. Use the exit command at the configuration level to return to privileged EXEC mode. Use the exit command in interface, line, router, ipx-router, and route map command modes to return to global configuration mode. Use the exit command in subinterface configuration mode to return to interface configuration mode. You can also press ^Z from any configuration mode to return to privileged EXEC mode.
In the following example, the user exits interface configuration mode to return to global configuration mode.
The following example shows how to exit an active session.
disconnect
enable last-resort
logout
Posted: Fri Jan 24 02:57:23 PST 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.