Technical data
BLADEOS 6.3 Command Reference
BMD00186-B, April 2010 Chapter 1: ISCLI Basics
25
Tab Completion
By entering the first letter of a command at any prompt and pressing <Tab>, the ISCLI displays all
available commands or options that begin with that letter. Entering additional letters further refines
the list of commands or options displayed. If only one command fits the input text when <Tab> is
pressed, that command is supplied on the command line, waiting to be entered.
If multiple commands share the typed characters, when you press <Tab>, the ISCLI completes the
common part of the shared syntax.
User Access Levels
To enable better switch management and user accountability, three levels or classes of user access
have been implemented on the
G8124. Levels of access to CLI, Web management functions, and
screens increase as needed to perform various switch management tasks. Conceptually, access
classes are defined as follows:
user
Interaction with the switch is completely passive—nothing can be changed on the
G8124. Users
may display information that has no security or privacy implications, such as switch statistics
and current operational state information.
oper
Operators can make temporary changes on the
G8124. These changes are lost when the switch
is rebooted/reset. Operators have access to the switch management features used for daily
switch operations. Because any changes an operator makes are undone by a reset of the switch,
operators cannot severely impact switch operation.
admin
Administrators are the only ones that may make permanent changes to the switch
configuration—changes that are persistent across a reboot/reset of the switch. Administrators
can access switch functions to configure and troubleshoot problems on the
G8124. Because
administrators can also make temporary (operator-level) changes as well, they must be aware
of the interactions between temporary and permanent changes.
Access to switch functions is controlled through the use of unique surnames and passwords. Once
you are connected to the switch via local Telnet, remote Telnet, or SSH, you are prompted to enter
a password. The default user names/password for each access level are listed in the following table.
Note – It is recommended that you change default switch passwords after initial configuration and
as regularly as required under your network security policies.