Function
Operation
Result
Move the cursor in
the edit line.
Left arrow or Ctrl-B
Move the cursor to a character to the left.
Left arrow or Ctrl-B
Move the cursor to a character on the right.
Ctrl-A
Move the cursor to the first command line.
Ctrl-E
Move the cursor to the first command line
Delete the input
character.
Backspace
A character to delete from the cursor to the left
of the
Delete key
A character to delete from the cursor to the left
of the
©
Return key
When the contents are displayed by enter key
will output the contents to the rolling line,
showing a line of content, using only the output
is not the end.
Space key
When the contents are displayed using the
space bar will output the contents to scrolling a
page, the next page content, only in the output
content does not end use.
1.7. Visit CLI
Before using CLI, users need to use a terminal or PC and network equipment connection. To start the
network equipment, network software and hardware initialization can be used after CLI. in network
equipment used for the first time only when using the serial port (Console) connected network device,
called out of band (Outband) management.
2. Configuration management
2.1. Login authentication control
2.1.1.
Summary
Through the authentication control can prevent illegal user access switch.
2.1.2.
To configure the local user
To establish a user identity authentication, please in global configuration mode, according to specific
needs, execute the following command
:
Command
Function
Switch(config)#
user
name [
password
password |
password
encryption-type
encrypted password]
Use encrypted password based user
authentication