1-10
The command alias function well meets the users’ requirements for preferred form of frequently used
commands, and thus facilitates network configurations as well as respects users' usage habits.
Follow these steps to configure command aliases:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enable the command alias
function
command-alias enable
Required
Disabled by default, that is, you
cannot configure command
aliases.
Configure command aliases
command-alias mapping
cmdkey alias
Required
Not configured by default.
Display defined command
aliases and the corresponding
commands
display command-alias
Available in any view
z
You can replace only the first keyword of a non-undo command instead of the complete command
with an alias; and you can replace only the second keyword of
undo
commands with aliases.
z
When you input a command alias, the system displays and saves the command in its original
format instead of its alias. That is, you can define and use a command alias but the command is not
saved and restored in its alias.
z
If you press
Tab
after you input the keyword of an alias, the original format of the keyword will be
displayed.
z
At present, the device supports up to 20 command aliases. In addition, different commands must
be configured with different aliases.
Configuring User Privilege Levels and Command Levels
Introduction
To restrict the different users’ access to the device, the system manages the users by their privilege
levels. User privilege levels correspond to command levels. After users at different privilege levels log in,
they can only use commands at their own, or lower, levels. All the commands are categorized into four
levels, which are visit, monitor, system, and manage from low to high, and identified respectively by 0
through 3.
Table 1-3
describes the levels of the commands.
Table 1-3
Default command levels
Level
Privilege
Description
0 Visit
Involves commands for network diagnosis and commands for
accessing an external device. Commands at this level are not allowed
to be saved after being configured. After the device is restarted, the
commands at this level will be restored to the default settings.
Commands at this level include
ping
,
tracert
,
telnet
and
ssh2
.