Specifications

6-2
Cisco ONS 15216 EDFA2/EDFA2-A Operations Guide, R2.4
July 2004
Chapter 6 ASH Commands
6.1 Summary of Security Permissions for ASH Commands
ffs file list Displays the files in flash memory.
See the “6.5.1 ffs file list Command” section on
page 6-14.
No Yes Yes
ffs file rename Renames flash file. No Yes Yes
ffs format Formats flash file system. No Yes Yes
ffs status display Displays current flash file system status. No Yes Yes
ffs tftp get Copies TFTP file to flash file system. No Yes Yes
ffs tftp put Copies flash file to TFTP file system. No Yes Yes
ffs tftp record get Copies record-based TFTP file to flash file. No Yes Yes
ffs tftp record put Copies record-based flash file to TFTP file. No Yes Yes
flash block display Displays flash memory. No No Yes
flash boot erase Erases flash boot sector. No No Yes
flash boot program tftp Programs flash from TFTP file. No No Yes
flash chip block display Displays chip block flash memory. No No Yes
flash chip display Displays flash chip information. No No Yes
gain attenuation display Displays target attenuation. Yes Yes Yes
gain gain display Displays gain setting.
See the “6.2.7 gain gain display Command”
section on page 6-9.
Yes Yes Yes
help Gives help about commands.
See the “6.3.3 help Command” section on
page 6-11.
Yes Yes Yes
history Displays the history list.
See the “6.3.4 history Command” section on
page 6-11.
Yes Yes Yes
login Allows the user to log into shell.
See the “6.3.5 login and logoff Commands”
section on page 6-11.
Yes Yes Yes
logoff Allows the user to log off of the shell.
See the 6.3.5 login and logoff Commands, page
6-11.
Yes Yes Yes
manufacturer clei display Displays CLEI code. Yes Yes Yes
manufacturer mode enable Enables access to manufacturer commands. No No Yes
manufacturer restore
defaults all
Restores all settings to manufacturer defaults.
See the “6.10.2 manufacturer restore defaults
all Command” section on page 6-31.
No No Yes
manufacturer restore
defaults passwords
Restores manufacturer password defaults.
See the “6.10.1 manufacturer restore defaults
passwords Command” section on page 6-30.
No No Yes
Table 6-1 ASH Commands Security Permissions (Access Levels) (continued)
Command Description
User Access Levels
RRWRWA