Chapter 4
| System Management Commands
Line
– 100 –
Line
You can access the onboard configuration program by attaching a VT100
compatible device to the server’s serial port. These commands are used to set
communication parameters for the serial port or Telnet (i.e., a virtual terminal).
Table 16: Line Commands
Command
Function
Mode
line
Identifies a specific line for configuration and starts the line
configuration mode
GC
accounting exec
Applies an accounting method to local console, Telnet or
SSH connections
LC
authorization exec
Applies an authorization method to local console, Telnet or
SSH connections
LC
databits
*
Sets the number of data bits per character that are
interpreted and generated by hardware
LC
exec-timeout
Sets the interval that the command interpreter waits until
user input is detected
LC
login
Enables password checking at login
LC
parity
*
Defines the generation of a parity bit
LC
password
Specifies a password on a line
LC
password-thresh
Sets the password intrusion threshold, which limits the
number of failed logon attempts
LC
silent-time
*
* These commands only apply to the serial port.
Sets the amount of time the management console is
inaccessible after the number of unsuccessful logon
attempts exceeds the threshold set by the
password-
thresh
command
LC
speed
*
Sets the terminal baud rate
LC
stopbits
*
Sets the number of the stop bits transmitted per byte
LC
timeout login response
Sets the interval that the system waits for a login attempt
LC
disconnect
Terminates a line connection
PE
show line
Displays a terminal line's parameters
NE, PE
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...