210
In This Chapter
Overview................................................................................................210
Accessing the Dominion KX II Using CLI ..............................................211
SSH Connection to the Dominion KX II.................................................211
Telnet Connection to the Dominion KX II ..............................................212
Logging In ..............................................................................................213
Navigation of the CLI .............................................................................214
Initial Configuration Using CLI ...............................................................215
CLI Prompts...........................................................................................216
CLI Commands......................................................................................216
Administering the Dominion KX II Console Server Configuration
Commands ............................................................................................218
Configuring Network ..............................................................................218
Overview
The Command Line Interface(CLI) can be used to configure the
Dominion KX II network interface and perform diagnostic functions
provided you have the appropriate permissions to do so.
The following figures describe an overview of the CLI commands. See
CLI Commands
(on page 216) for a list of all the commands, which
include definitions and links to the sections in this chapter that give
examples of these commands.
The following common commands can be used from all levels of the CLI
to the preceding figure: top, history, log off, quit, show, and help.
Note: Both IPv4 and IPv6 addresses are supported.
Chapter 12 Command Line Interface (CLI)
Содержание Dominion KX2-864
Страница 13: ...Chapter 1 Introduction 4...
Страница 15: ...Chapter 1 Introduction 6 Product Photos Dominion KX II KX2 832...
Страница 16: ...Chapter 1 Introduction 7 KX2 864...
Страница 87: ...Chapter 4 Virtual Media 78...
Страница 109: ...Chapter 6 User Management 100...
Страница 127: ...Chapter 6 User Management 118 Remote authentication follows the process specified in the flowchart below...
Страница 141: ...Chapter 7 Device Management 132 3 Click OK...
Страница 151: ...Chapter 7 Device Management 142 3 Click OK...
Страница 196: ...Chapter 9 Security Management 187 2 Click Delete 3 You are prompted to confirm the deletion Click OK...