![Huawei Quidway NetEngine80 Configuration Manual Download Page 51](http://html.mh-extra.com/html/huawei/quidway-netengine80/quidway-netengine80_configuration-manual_169456051.webp)
3 CLI Overview
Quidway NetEngine80
Configuration Guide - Basic Configurations
3-2
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
Issue 04 (2009-12-20)
3.1 Introduction
3.1.1 Command Line Interface
When a prompt appears, you enter the command line interface (CLI) and interact with routers
through CLI.
The system provides a series of configuration commands. You can configure and manage the
router by entering commands on CLI.
A CLI features as follows:
z
Local or remote configuration through AUX port.
z
Local configuration through the console port.
z
Local or remote configuration through Telnet or Secure Shell (SSH).
z
Remote configuration by logging in to the an asynchronous serial interface on a router
through Modem dialup.
z
A user interface view for specific configuration management.
z
Hierarchical command protection for users of different levels, that is running the
commands based on the corresponding level.
z
Local authentication, password authentication and Authentication, Authorization and
Accounting (AAA) to prevent the unauthorized user from accessing the router.
z
Entering "
?"
for online help at any time.
z
Network testing commands such as
tracert
and
ping
for rapidly diagnosing a network.
z
Abundant debugging information to help in diagnosing the network.
z
The
telnet
command for directly logging in to and manage other routers.
z
FTP service for the file uploading and downloading.
z
Running a history command, like DosKey.
z
A command line interpreter provides intelligent command resolution methods such as
key word fuzzy match and context conjunction. These methods make it easy for users to
enter their commands.
z
The system supports the command with 255 characters at most. The command can be in an
incomplete form.
z
The system saves the incomplete command to the configuration files in the complete form; therefore,
the command may have more than 255 characters. However, when the system is restarted, the
incomplete command cannot be restored. So, pay attention to the length of the incomplete command.
3.1.2 Command Levels
The system adopts a hierarchical protection mode that has 16 command levels.
The default command level are as follows:
z
Level 0-Visit level: Commands of this level include commands of network diagnosis tool
(such as ping and tracert) and commands that start from the local device and visit
external device (including Telnet client side, SSH client side and Rlogin) and so on.