20
C
HAPTER
1: U
SING
THE
CLI
User EXEC Mode
After logging into the device, the user is automatically in User EXEC
command mode unless the user is defined as a privileged user. In general,
the User EXEC commands allow the user to perform basic tests, and list
system information.
The user-level prompt consists of the device host name followed by the
angle bracket (>).
The default host name is Console unless it has been changed using the
hostname
command in the Global Configuration mode.
Privileged EXEC
Privileged access is password protected to prevent unauthorized use
because many of the Privileged commands set operating system
parameters. The password is not displayed on the screen and is case
sensitive.
Privileged users enter directly into the Privileged EXEC mode. To enter the
Privileged EXEC mode from the User EXEC mode, perform the following
steps:
1
At the prompt enter the
enable
command and press <Enter>. A
password prompt is displayed.
2
Enter the password and press <Enter>. The password is displayed as *.
The Privileged EXEC mode prompt is displayed. The Privileged EXEC mode
prompt consists of the device host name followed by
#
.
3
To return from the Privileged EXEC mode to the User EXEC mode, use the
disable
command.
The following example illustrates how to access the Privileged EXEC
mode and return to the User EXEC mode:
4
The
exit
command is used to return from any mode to the previous
mode except when returning to the User EXEC mode from the Privileged
EXEC mode. For example, the
exit
command is used to return from the
Interface Configuration mode to the Global Configuration mode.
Console>
Console>
enable
Enter Password: ******
Console#
Console#
disable
Console>
Summary of Contents for 3CRUS2475 24
Page 18: ......
Page 40: ...40 CHAPTER 2 AAA COMMANDS ...
Page 54: ...54 CHAPTER 3 ACL COMMANDS ...
Page 76: ...76 CHAPTER 4 ADDRESS TABLE COMMANDS ...
Page 166: ...166 CHAPTER 10 CLOCK COMMANDS ...
Page 200: ...200 CHAPTER 13 LACP COMMANDS ...
Page 208: ...208 CHAPTER 14 POWER OVER ETHERNET COMMANDS ...
Page 262: ...262 CHAPTER 15 SPANNING TREE COMMANDS ...
Page 278: ...278 CHAPTER 17 RADIUS COMMAND ...
Page 281: ...show ports monitor 281 g1 8 RX TX Active g2 8 RX TX Active g18 8 RX Active ...
Page 282: ...282 CHAPTER 18 PORT MONITOR COMMANDS ...
Page 306: ...306 CHAPTER 19 SNMP COMMANDS ...
Page 316: ...316 CHAPTER 20 IP ADDRESS COMMANDS ...
Page 330: ...330 CHAPTER 22 WIRELESS ROGUE AP COMMANDS ...
Page 350: ...350 CHAPTER 23 WIRELESS ESS COMMANDS ...
Page 382: ...382 CHAPTER 25 SSH COMMANDS ...
Page 400: ...400 CHAPTER 27 TACACS COMMANDS Global values TimeOut 3 ...
Page 444: ...444 CHAPTER 31 USER INTERFACE COMMANDS ...
Page 454: ...454 CHAPTER 32 GVRP COMMANDS ...
Page 492: ...492 CHAPTER 34 802 1X COMMANDS ...
Page 521: ...Troubleshooting Solutions 521 ...
Page 522: ...522 CHAPTER 37 TROUBLESHOOTING ...