F I N A L D R A F T - C I S C O C O N F I D E N T I A L
6-5
Cisco ONS 15216 EDFA2 Operations Guide
78-16033-01
Chapter 6 ASH Commands
Summary of Security Permissions for ASH Commands
snmp tree attribute list
Lists the attributes in the MIB.
See
snmp tree attribute list Command, page
6-25
.
No
Yes
Yes
snmp tree mib list
Lists the MIBs in the MIB tree.
No
Yes
Yes
snmp tree oid display
Displays object identifier (OID) for a MIB tree
object.
No
Yes
Yes
snmp tree syntax display
Displays the syntax of a MIB tree object.
No
Yes
Yes
snmp tree table provided
list
Lists provided tables in the MIB tree.
No
Yes
Yes
srom cfg boot display
Displays the serial ROM boot content.
See
srom cfg boot display Command, page 6-6
.
No
Yes
Yes
srom cfg boot modify
Modifies the serial ROM boot contents.
See
srom cfg boot modify Command, page 6-7
.
No
Yes
Yes
srom cfg debug display
Displays one config (CFG) ROM byte.
No
No
Yes
srom cfg debug modify
Modifies one CFG ROM byte.
No
No
Yes
srom cfg display
Displays CFG ROM contents.
No
Yes
Yes
srom cfg ip display
Displays the serial ROM IP contents.
See
srom cfg ip display Command, page 6-7
.
No
Yes
Yes
srom cfg ip modify
Modifies the serial ROM IP contents.
See
srom cfg ip modify Command, page 6-8
No
Yes
Yes
srom cfg modify
Modifies CFG ROM contents.
No
Yes
Yes
srom id display
Displays serial ROM contents.
No
Yes
Yes
tl1c
TL1s to host.
Yes
Yes
Yes
user active list
Lists the active users.
See
user active list Command, page 6-29
.
No
Yes
Yes
user active message send
Sends the message to all active users.
See
user active message send Command, page
6-29
.
No
Yes
Yes
user entry create
Creates a new user.
See
user entry create Command, page 6-26
.
No
No
Yes
user entry delete
Deletes the user.
See
user entry delete Command, page 6-27
.
No
No
Yes
user entry edit
Edits an existing user entry.
See
user entry edit Command, page 6-26
.
No
No
Yes
user file display
Displays the user names and information.
See
user file display and user name display
Commands, page 6-27
.
No
Yes
Yes
user inactivity display
Displays user inactivity times.
See
user inactivity modify and user inactivity
display Commands, page 6-28
.
Yes
Yes
Yes
Table 6-1
ASH Commands Security Permissions (Access Levels) (continued)
Command
Description
User Access Levels
R
RW
RWA