|
To turn off a previously set debug command, use the undebug privileged EXEC command. Use the no form of this command to disable the debug function.
This command has no keywords or arguments.
All debug commands are entered while in privilege EXEC mode, and most debug commands do not take any arguments. To enable the debug atm rm command, enter the following:
To turn off the debug atm rm command, enter either the no form of this command or the undebug form of the command.
debug atm oam-all
debug atm oam-pkt
debug atm pnni
debug atm rm
debug atm sig
debug sscop
To recover a deleted file on a specified device, use the undelete EXEC command.
The default device is the one specified by the cd command.
When you delete a file, the switch simply marks the file as deleted but does not erase the file. This command allows you to recover a "deleted" file on a specified Flash memory device. You must undelete a file by its index because you could have multiple deleted files with the same name. For example, the "deleted" list could contain multiple configuration files with the name switch-config. You undelete by index to indicate which of the many switch-config files from the list to undelete. Use the dir command to learn the index number of the file you want to undelete.
You cannot undelete a file if a valid (undeleted) one with the same name exists. Instead, you first delete the existing file and then undelete the file you want. For example, if you had an undeleted version of the switch-config file and you wanted to use a previous, deleted version, you could not simply undelete the previous version by index. First delete the existing switch-config file, and then undelete the previous switch-config file by index. You can delete and undelete a file up to 15 times.
If you try to recover the configuration file pointed to by the config_file environment variable, the system prompts you to confirm recovery of the file. This prompt reminds you that the config_file environment variable points to an undeleted file. To permanently delete all "deleted" files on a Flash memory device, use the squeeze command. If you try to recover a file that has the same name as an existing valid file, the system displays an error message.
The following example recovers the deleted file whose index number is 1 to the Flash memory card inserted in slot 0 of the ASP card.
To establish a username-based authentication system at login, even though your network cannot support a TACACS service, use the username global configuration command.
The username command provides username/password authentication for login purposes only. (Note that it does not provide username/password authentication for enable mode when the enable use-tacacs command is also used.)
Multiple username commands can be used to specify options for a single user.
Add a username entry for each remote system that the local switch communicates with and requires authentication from. The remote device must have a username entry for the local switch. This entry must have the same password as the local switch's entry for that remote device.
This command can be useful for defining usernames that get special treatment, for example, an "info" username that does not require a password but connects the user to a general-purpose information service.
The username command is also required as part of the configuration for the Challenge Handshake Authentication Protocol (CHAP). For each remote system that the local switch communicates with from which it requires authentication, add a username entry.
Note To enable the local switch to respond to remote CHAP challenges, one username name entry must be the same as the hostname name entry that was already assigned to your switch.
If there is no secret specified and debug serial-interface is enabled, an error is displayed when an interface is established and the CHAP challenge is not implemented. Debugging information on CHAP is available using the debug serial-interface and debug serial-packet commands. For more information about debug commands, refer to the Debug Command Reference publication.
To implement a service similar to the UNIX who command, which can be entered at the login prompt and lists the current users of the switch, the username command takes the following form.
To implement an information service that does not require a password to be used, the command takes the following form.
To implement an ID that works even if the TACACS servers all go down, the command takes the following form.
The following example configuration enables CHAP on interface serial 0. It also defines a password for the local server, Adam, and a remote server, Eve.
When you look at your configuration file, the passwords are encrypted and the display looks similar to the following output.
Posted: Thu Jan 23 20:57:41 PST 2003
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.