NAME telnet - user interface to the TELNET protocol. SYNOPSIS telnet [[options ] host [ port ]]

Size: px
Start display at page:

Download "NAME telnet - user interface to the TELNET protocol. SYNOPSIS telnet [[options ] host [ port ]]"

Transcription

1 NAME telnet - user interface to the TELNET protocol SYNOPSIS telnet [[options ] host [ port ]] DESCRIPTION telnet is used to communicate with another host using the TELNET protocol. If telnet is invoked without arguments, it enters command mode, indicated by its prompt (telnet>). In this mode, it accepts and executes the commands listed below. If telnet is invoked with arguments, it performs an open command (see below) with those arguments. Once a connection has been opened, telnet enters an input mode. The input mode will be either "character at a time" or "line by line", depending on what the remote system supports. In "character at a time" mode, most text typed is immediately sent to the remote host for processing. In "line by line" mode, all text is echoed locally, and (normally) only completed lines are sent to the remote host. The "local echo character" (initially ˆE) can be used to turn-off and turn-on the local echo (this would mostly be used to enter passwords without the password being echoed). In either mode, if the localchars toggle is TRUE (the default in line mode; see below), the user s quit and intr characters are trapped locally, and sent as TELNET protocol sequences to the remote side. There are options (see toggle autoflush and toggle autosynch below) that cause this action to flush subsequent output to the terminal (until the remote host acknowledges the TELNET sequence) and flush previous terminal input (in the case of quit and intr). While connected to a remote host, telnet command mode can be entered by typing the telnet "escape character" (initially ˆ]). When in command mode, the normal terminal editing conventions are available. telnet supports 8-bit characters when communicating with the server on the remote host. To use eight-bit characters you may need to reconfigure your terminal or the remote host appropriately (see stty (1)). Furthermore, you may have to use the binary toggle to enable an 8-bit data stream between telnet and the remote host. Note: Some remote hosts may not provide the necessary support for eight-bit characters. If, at any time, telnet is unable to read from or write to the server over the connection, the message Connection closed by foreign host. is printed on standard error. telnet then exits with a value of 1. telnet supports the TAC User ID (also known as the TAC Access Control System, or TACACS User ID) option. Enabling the option on a host server allows the user to telnet into that host without being prompted for a second login sequence. The TAC User ID option uses the same security mechanism as rlogin for authorizing access by remote hosts and users. The system administrator must enable the (telnetd) option only on systems, which are designated as participating hosts. The system administrator must also assign to each user of TAC User ID the very same UID on every system for which he is allowed to use the feature. See the telnetd (1M) manpage and the HP-UX System Administrator s Guide. Options The following telnet options are available: -8 Enable cs8 (8 bit transfer) on local tty. -e c Set the telnet command mode escape character to be ˆc instead of its default value of ˆ]. -l Disable the TAC User ID option if enabled on the client, to cause the user to be prompted for login username and password. Omitting the -l option executes the default setting. Kerberos-Specific Options By default, or by use of the -a or the -l option, the Kerberos version of telnet behaves as a client which supports authentication based on Kerberos V5. As a Kerberos client, telnet will authenticate and authorize the user to access the remote system. See the sis(5) manpage for details on Kerberos authentication and authorization. However, it will not support integrity-checked or encrypted sessions. The default Kerberos options for the applications are set in the krb5.conf configuration file. Refer to the appdefaults Section in the krb5.conf (4) manpage for more information. The options -a, -f, and -F described in the subsequent paragraphs, can be set in the krb5.conf file with the tag names HP-UX 11i Version 3: September Hewlett-Packard Company 1

2 autologin, forward, and forwardable respectively. Refer to the appdefaults Section of the krb5.conf (4) manpage for more information. The fallback option can be set in the krb5.conf file within appdefaults Section. If fallback is set to true and the kerberos authentication fails, telnet will use the non-secure mode of authentication. Note: Command line options override configuration file options. The following options are Kerboros-specific: -a This option is applicable only in a secure environment based on Kerberos V5. Attempt automatic login into the Kerberos realm and disable the TAC User ID option. Note: This is the default login mode. Sends the user name via the NAME subnegotiation of the Authentication option. The name used is that of the current user as returned by the USER environment variable. If this variable is not defined, the name used is that returned by getpwnam() (see getpwent (3C)) if it agrees with the current user ID. Otherwise, it is the name associated with the user ID. -P This option is applicable only in a secure environment based on Kerberos V5. Disable use of Kerberos authentication and authorization. When this option is specified, a password is required that is sent across the network in a readable form. See the sis(5) manpage. -f This option is applicable only in a secure environment based on Kerberos V5. Allows local credentials to be forwarded to the remote system. Only one -f or -F option is allowed. They cannot be used together. -F This option is applicable only in a secure environment based on Kerberos V5. Allows local credentials to be forwarded to the remote system including any credentials that have already been forwarded into the local environment. Only one -f or -F option is allowed. They cannot be used together. -l user This option is applicable only in a secure environment based on Kerberos V5. Attempt automatic login into the Kerberos realm as the specified user and disable the TAC User ID option. The user name specified is sent via the NAME subnegotiation of the Authentication option. Omitting the -l option executes the default setting. Only one -l option is allowed. Commands The following commands are available in command mode. You need to type only sufficient prefix of each command to uniquely identify it (this is also true for arguments to the mode, set, toggle, and display commands). open host [ port ] Open a connection to the named host at the indicated port. If no port is specified, telnet attempts to contact a TELNET server at the standard TELNET port. In the IPv4 environment, hostname can be either the official name or an alias as understood by gethostbyname() (see gethostent (3N)) or an Internet address specified in the dot notation as described in hosts (4). In the IPv6 environment, hostname can be either the official name or an alias as understood by getnameinfo() (see getnameinfo (3N)) or an Internet address specified in the colon notation as described in hosts (4). If no hostname is given, telnet prompts for one. close Close a TELNET session. If the session was started from command mode, telnet returns to command mode; otherwise telnet exits. quit Close any open TELNET session and exit telnet. An end of file (in command mode) will also close a session and exit. z Suspend telnet. Iftelnet is run from a shell that supports job control, (such as csh(1) or ksh(1)), the z command suspends the TELNET session and returns the user to the shell that invoked telnet. Then the job can be resumed by using the fg command (see csh(1) or ksh(1)). mode mode Change telnet s user input mode to mode, which can be character (for "character at a time" mode) or line (for "line by line" mode). The remote host is asked for permission to go into the requested mode. If the remote host is capable of entering that mode, the requested mode is entered. In character mode, telnet sends each character to the remote host as it is typed. In line mode, telnet gathers user input into lines and transmits each line to the remote host when the user types carriage return, linefeed, or 2 Hewlett-Packard Company 2 HP-UX 11i Version 3: September 2010

3 EOF (normally ˆD; see stty (1)). Note: Setting line-mode also sets local echo. Applications that expect to interpret user input character by character (such as more, csh, ksh, and vi) do not work properly in line mode. status Show current status of telnet. telnet reports the current escape character. If telnet is connected, it reports the host to which it is connected and the current mode. If telnet is not connected to a remote host, it reports No connection. Once telnet has been connected, it reports the local flow control toggle value. display [ argument... ] Displays all or some of the set and toggle values (see below).? [ command ] Get help. With no arguments, telnet prints a help summary. If a command is specified, telnet prints the help information available about that command only. Help information is limited to a one-line description of the command.! [ shell_command ] Shell escape. The SHELL environment variable is checked for the name of a shell to use to execute the command. If no shell_command is specified, a shell is started and connected to the user s terminal. If SHELL is undefined, /usr/bin/sh is used. send arguments Sends one or more special character sequences to the remote host. Each argument can have any of the following values (multiple argument s can be specified with each send command): escape Sends the current telnet escape character (initially ˆ]). synch Sends the TELNET SYNCH sequence. This sequence causes the remote system to discard all previously typed (but not yet read) input. This sequence is sent as TCP urgent data (and may not work to some systems -- if it doesn t work, a lower case r may be echoed on the terminal). brk Sends the TELNET BRK (Break) sequence, which may have significance to the remote system. ip Sends the TELNET IP (Interrupt Process) sequence, which should cause the remote system to abort the currently running process. ao Sends the TELNET AO (Abort Output) sequence, which should cause the remote system to flush all output from the remote system to the user s terminal. ayt Sends the TELNET AYT (Are You There) sequence, to which the remote system may or may not choose to respond. ec Sends the TELNET EC (Erase Character) sequence, which should cause the remote system to erase the last character entered. el Sends the TELNET EL (Erase Line) sequence, which should cause the remote system to erase the line currently being entered. ga Sends the TELNET GA (Go Ahead) sequence, which is likely to have no significance to the remote system. nop Sends the TELNET NOP (No OPeration) sequence.? Prints out help information for the send command. set variable_name value Set any of the telnet variables to a specific value. The special value off turns off the function associated with the variable. The values of variables can be shown by using the display command. The following variable_names can be specified: echo This is the value (initially ˆE) which, toggles between doing local echoing of entered characters (for normal processing), and suppressing echoing of entered characters (for entering, for example, a password) in line-by-line mode. HP-UX 11i Version 3: September Hewlett-Packard Company 3

4 escape This is the telnet escape character (initially ˆ]) that causes entry into telnet command mode (when connected to a remote system). interrupt If telnet is in localchars mode (see toggle localchars below) and the interrupt character is typed, a TELNET IP sequence (see send ip above) is sent to the remote host. The initial value for the interrupt character is taken to be the terminal s intr character. quit If telnet is in localchars mode (see toggle localchars below) and the quit character is typed, a TELNET BRK sequence (see send brk above) is sent to the remote host. The initial value for the quit character is taken to be the terminal s quit character. flushoutput If telnet is in localchars mode (see toggle localchars below) and the flushoutput character is typed, a TELNET AO sequence (see send ao above) is sent to the remote host. The initial value for the flush character is ˆO. erase If telnet is in localchars mode (see toggle localchars below), and if telnet is operating in character-at-a-time mode, then when this character is typed, a TELNET EC sequence (see send ec above) is sent to the remote system. The initial value for the erase character is taken to be the terminal s erase character. kill If telnet is in localchars mode (see toggle localchars below), and if telnet is operating in character-at-a-time mode, then when this character is typed, a TELNET EL sequence (see send el above) is sent to the remote system. The initial value for the kill character is taken to be the terminal s kill character. eof If telnet is operating in line-by-line mode, entering this character as the first character on a line causes this character to be sent to the remote system. The initial value of the eof character is taken to be the terminal s eof character. toggle arguments... Toggle (between TRUE and FALSE ) various flags that control how telnet responds to events. More than one argument can be specified. The state of these flags can be shown by using the display command. Valid arguments are: localchars If TRUE, the flush, interrupt, quit, erase, and kill characters (see set above) are recognized locally, and transformed into appropriate TELNET control sequences (respectively ao, ip, brk, ec, and el; see send above). The initial value for this toggle is TRUE in line-by-line mode, and FALSE in character-at-a-time mode. autoflush If autoflush and localchars are both TRUE, whenever the ao, intr, or quit characters are recognized (and transformed into TELNET sequences see set above for details), telnet refuses to display any data on the user s terminal until the remote system acknowledges (via a TELNET Timing Mark option) that it has processed those TELNET sequences. The initial value for this toggle is TRUE. autologin This flag is available only in a secure environment based on Kerberos V5. Enable or disable automatic login into the Kerberos realm. Using this option yields the same results as using the -a option. The initial value for this toggle is TRUE. autosynch If autosynch and localchars are both TRUE, when either the intr or quit character is typed (see set above for descriptions of the intr and quit characters), the resulting TELNET sequence sent is followed by the TELNET SYNCH sequence. This procedure causes the remote system to begin 4 Hewlett-Packard Company 4 HP-UX 11i Version 3: September 2010

5 discarding all previously typed input until both of the TELNET sequences have been read and acted upon. The initial value of this toggle is FALSE. binary Enable or disable the TELNET BINARY option on both input and output. This option should be enabled in order to send and receive 8-bit characters to and from the TELNET server. crlf If TRUE, end-of-line sequences are sent as an ASCII carriage-return and linefeed pair. If FALSE, end-of-line sequences are sent as an ASCII carriagereturn and NUL character pair. The initial value for this toggle is FALSE. crmod Toggle carriage return mode. When this mode is enabled, any carriage return characters received from the remote host are mapped into a carriage return and a line feed. This mode does not affect those characters typed by the user; only those received. This mode is only required for some hosts that require the client to do local echoing, but output naked carriage returns. The initial value for this toggle is FALSE. echo Toggle local echo mode or remote echo mode. In local echo mode, user input is echoed to the terminal by the local telnet before being transmitted to the remote host. In remote echo, any echoing of user input is done by the remote host. Applications that handle echoing of user input themselves, such as C shell, Korn shell, and vi (see csh(1), ksh(1), and vi(1)), do not work correctly with local echo. options Toggle viewing of TELNET options processing. When options viewing is enabled, all TELNET option negotiations are displayed. Options sent by telnet are displayed as SENT, while options received from the TEL- NET server are displayed as RCVD. The initial value for this toggle is FALSE. netdata Toggles the display of all network data (in hexadecimal format). The initial value for this toggle is FALSE.? Displays the legal toggle commands. RETURN VALUE In the event of an error, or if the TELNET connection is closed by the remote host, telnet returns a value of 1. Otherwise, it returns 0. DIAGNOSTICS The following diagnostic messages are displayed by telnet: Error! Could not retrieve authentication type. There are two authentication mechanisms used by TELNET. One authentication mechanism is based on Kerberos and the other is not. The type of authentication mechanism is obtained from a system file, which is updated by inetsvcs_sec. If the system file on either the local host or the remote host does not contain known authentication types, the above error is displayed. telnet/tcp: Unknown service telnet was unable to find the TELNET service entry in the services (4) database. hostname: Unknown host telnet was unable to map the host name to an Internet address. Your next step should be to contact the system administrator to check whether there is an entry for the remote host in the hosts database (see hosts (4)).?Invalid command An invalid command was typed in telnet command mode. system call>:... An error occurred in the specified system call. See the appropriate manual entry for a description of the error. AUTHOR telnet was developed by the University of California, Berkeley. HP-UX 11i Version 3: September Hewlett-Packard Company 5

6 SEE ALSO csh(1), ksh(1), login(1), rlogin(1), stty(1), telnetd(1m), inetsvcs_sec(1m), hosts(4), krb5.conf(4), services(4), sis(5), termio(7). 6 Hewlett-Packard Company 6 HP-UX 11i Version 3: September 2010

D. Borman, Editor Cray Research, Inc. August 1989

D. Borman, Editor Cray Research, Inc. August 1989 Network Working Group Request for Comments: 1116 Internet Engineering Task Force Telnet Linemode Working Group D. Borman, Editor Cray Research, Inc. August 1989 Telnet Linemode Option Status of this Memo

More information

October Telnet Linemode Option. Status of this Memo

October Telnet Linemode Option. Status of this Memo Network Working Group Request for Comments: 1184 Obsoletes: RFC 1116 Telnet Working Group D. Borman, Editor Cray Research, Inc. October 1990 Telnet Linemode Option Status of this Memo This memo describes

More information

Network Working Group Request for Comments: 854 ISI Obsoletes: NIC May 1983

Network Working Group Request for Comments: 854 ISI Obsoletes: NIC May 1983 Network Working Group J. Postel Request for Comments: 854 J. Reynolds ISI Obsoletes: NIC 18639 May 1983 TELNET PROTOCOL SPECIFICATION This RFC specifies a standard for the ARPA Internet community. Hosts

More information

Virtual Terminal Apps telnet/rlogin

Virtual Terminal Apps telnet/rlogin Virtual Terminal Apps telnet/rlogin TCP/IP class 1 outline intro telnet architecture nvt option negotiation rlogin what else? 2 intro - network terminals telnet - TCP/IP classic application, RFC 854, 1983

More information

Configuring Dial-In Terminal Services

Configuring Dial-In Terminal Services Configuring Dial-In Terminal Services This chapter describes how to configure support for asynchronous character stream calls running Telnet, rlogin, local-area transport (LAT), XRemote, or TN3270. It

More information

Study Guide Linux Terminals

Study Guide Linux Terminals Study Guide Linux Terminals Q1 - Keyboard shortcuts Match the following actions or meanings to the corresponding keyboard shortcuts. # Actions # Shortcuts 1 Interrupt the currently executing program 1

More information

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1

Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Table of Contents 1 Commands for Access Controller Switch Interface Board 1-1 Commands for Access Controller and Access Controller Switch Interface Board 1-1 acl (user interface view) 1-1 activation-key

More information

Symbols INDEX. <cr> baud rates? command xiv. transmit line speed, configuring. buffers. XRemote size TR-224 busy-message command

Symbols INDEX. <cr> baud rates? command xiv. transmit line speed, configuring. buffers. XRemote size TR-224 busy-message command INDEX Symbols B xv baud rates? command xiv transmit line speed, configuring TR-208 buffers A XRemote size TR-224 busy-message command TR-17 absolute-timeout command TR-2 access-class (LAT) command

More information

Internet Fundamentals

Internet Fundamentals Internet Fundamentals Lecture-16 TELNET NVT Chapter 18 Remote Login: Telnet Objectives Upon completion you will be able to: Understand how TELNET works Understand the role of NVT in a TELNET communication

More information

Chapter 1 Configuring TCP/IP

Chapter 1 Configuring TCP/IP Chapter 1 Configuring TCP/IP 1 This chapter describes the TCP/IP protocol, and specifically, how Cisco Systems implements this protocol on its protocol translators. Topics in this chapter include: Configuring

More information

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER 4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information

More information

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p.

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. 2 Conventions Used in This Book p. 2 Introduction to UNIX p. 5 An Overview

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

The Compact Single-Port Terminal Server User s Guide

The Compact Single-Port Terminal Server User s Guide The Compact Single-Port Terminal Server User s Guide Black Box Corporation 1000 Park Drive Lawrence, PA 15055 Document Number: LE995A-R4 Printed in the United States of America. i Notices All rights reserved.

More information

Examples of Cisco APE Scenarios

Examples of Cisco APE Scenarios CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions

More information

Performing Basic System Management

Performing Basic System Management This module describes the basic tasks that you can perform to manage the general system features of the Cisco IOS software--those features that are generally not specific to a particular protocol. Finding

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or 5.6 to Cisco ISE, Release 2.0., page 1 Migrated Data

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., page 1 Migrated

More information

lsx [ls_options ] [names]

lsx [ls_options ] [names] NAME ls, lc, l, ll, lsf, lsr, lsx - list contents of directories SYNOPSIS ls [-abcdefgilmnopqrstuxacfhlr1] [names] lc [-abcdefgilmnopqrstuxacfhlr1] [names] l [ls_options ] [names] ll [ls_options ] [names]

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Configuring Kerberos

Configuring Kerberos Configuring Kerberos Last Updated: January 26, 2012 Finding Feature Information, page 1 Information About Kerberos, page 1 How to Configure Kerberos, page 5 Kerberos Configuration Examples, page 13 Additional

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or 5.6 to Cisco ISE, Release 1.4., page 1 Migrated Data

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from, Release 5.5 or later to Cisco ISE, Release 2.3., page 1 Supported Data Objects for

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.3., on page 1 Supported

More information

HP-UX TN3270 Users Guide

HP-UX TN3270 Users Guide HP-UX TN3270 Users Guide Edition 1 HP Part Number J2656-90030 J2656-90030 HP 9000 Networking E03/98 Printed in: United States Copyright 1998 Hewlett-Packard Company, 1998. All rights reserved Legal Notices

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright

More information

Network Working Group. NIC: June 1973

Network Working Group. NIC: June 1973 Network Working Group E. Faeh Request for Comments: 437 Computer Systems Laboratory, UCSB NIC: 13701 30 June 1973 DATA RECONFIGURATION SERVICE AT UCSB This purpose of this RFC is to announce the availability

More information

IOLAN. DS1/TS2 Command Line Interface Reference Guide. Version 3.4 Part #

IOLAN. DS1/TS2 Command Line Interface Reference Guide. Version 3.4 Part # IOLAN DS1/TS2 Command Line Interface Reference Guide Version 3.4 Part #5500208-11 January 2008 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or electronically,

More information

Terminal Services Commands translate lat

Terminal Services Commands translate lat translate lat translate lat To translate a connection request to another protocol connection type when receiving a local-area transport (LAT) request, use the translate lat command in global configuration

More information

TACACS+ Configuration Mode Commands

TACACS+ Configuration Mode Commands Important TACACS Configuration Mode is available in releases 11.0 and later. This chapter describes all commands available in the TACACS+ Configuration Mode. TACACS+ (Terminal Access Controller Access-Control

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

Chapter 6 Global CONFIG Commands

Chapter 6 Global CONFIG Commands Chapter 6 Global CONFIG Commands aaa accounting Configures RADIUS or TACACS+ accounting for recording information about user activity and system events. When you configure accounting on an HP device, information

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

ivu Plus BCR Communications Instruction Manual

ivu Plus BCR Communications Instruction Manual ivu Plus BCR Communications Instruction Manual Original Instructions B_3084221 Rev. C 18 March 2014 Contents 1 Introduction... 3 2 ivu Plus Communication Summary of Ethernet and Serial... 4 2.1 Communication

More information

Telnet Server Application note for W5200

Telnet Server Application note for W5200 Telnet Server Application note for W5200 Version 1.0 2011 WIZnet Co., Inc. All Rights Reserved. For more information, visit our website at http://www.wiznet.co.kr Copyright 2011 WIZnet Co., Inc. All rights

More information

January Sender is willing to send list of supported 3270 Regimes in a subsequent sub-negotiation.

January Sender is willing to send list of supported 3270 Regimes in a subsequent sub-negotiation. Network Working Group Request For Comments: 1041 J. Rekhter T.J. Watson Research Center, IBM January 1988 Telnet 3270 Regime Option STATUS OF THIS MEMO This RFC specifies a proposed standard for the Internet

More information

Network Working Group Request for Comments: 1576 Category: Informational January 1994

Network Working Group Request for Comments: 1576 Category: Informational January 1994 Network Working Group J. Penner Request for Comments: 1576 DCA, Inc. Category: Informational January 1994 Status of this Memo TN3270 Current Practices This memo provides information for the Internet community.

More information

Most of the work is done in the context of the process rather than handled separately by the kernel

Most of the work is done in the context of the process rather than handled separately by the kernel Process Control Process Abstraction for a running program Manages program s use of memory, cpu time, and i/o resources Most of the work is done in the context of the process rather than handled separately

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.2., page 1 Supported

More information

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc. Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds

More information

Unix Scripts and Job Scheduling. Overview. Running a Shell Script

Unix Scripts and Job Scheduling. Overview. Running a Shell Script Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

VISUDO(8) System Manager s Manual VISUDO(8)

VISUDO(8) System Manager s Manual VISUDO(8) NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information About Configuring Secure Shell, page 2 How to Configure Secure Shell, page 4 Monitoring

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

II I, F/6B7/ BOLT BERANEK AND NEWMAN INC CAMBRI06E MA PLURIBJS TIP USERS' BUIDE.(U) JAN 81 N W MIMNOE W HISCOX DCAIII-77-C-0616.

II I, F/6B7/ BOLT BERANEK AND NEWMAN INC CAMBRI06E MA PLURIBJS TIP USERS' BUIDE.(U) JAN 81 N W MIMNOE W HISCOX DCAIII-77-C-0616. AD-AO9g 936 AUN-CLASSIFIED BB-41 3 5 F/6B7/ BOLT BERANEK AND NEWMAN INC CAMBRI06E MA PLURIBJS TIP USERS' BUIDE.(U) JAN 81 N W MIMNOE W HISCOX DCAIII-77-C-0616 ML II I, I Bolt Beranek and Newman Inc Iml71

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Nortel Unified Communications Management. Fundamentals. Release: 1.0 Document Revision: NN

Nortel Unified Communications Management. Fundamentals. Release: 1.0 Document Revision: NN Release: 1.0 Document Revision: 01.01 www.nortel.com NN48014-100. Release: 1.0 Publication: NN48014-100 Document release date: All Rights Reserved. Printed in Canada NORTEL, the globemark design, and the

More information

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza Sommario Shell command language Introduction A

More information

CSCI 2132 Software Development. Lecture 3: Unix Shells and Other Basic Concepts

CSCI 2132 Software Development. Lecture 3: Unix Shells and Other Basic Concepts CSCI 2132 Software Development Lecture 3: Unix Shells and Other Basic Concepts Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 10-Sep-2018 (3) CSCI 2132 1 Introduction to UNIX

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

Chapter 1 TCP/IP Configuration and Management

Chapter 1 TCP/IP Configuration and Management Chapter 1 TCP/IP Configuration and Management 1 This chapter describes how to configure the TCP/IP protocol, and specifically, how Cisco Systems implements this protocol on its protocol translators. You

More information

IOLAN. DS1/TS2 Command Line Interface Reference Guide. Version 4.9 Part # (Rev B)

IOLAN. DS1/TS2 Command Line Interface Reference Guide. Version 4.9 Part # (Rev B) IOLAN DS1/TS2 Command Line Interface Reference Guide Version 4.9 Part #5500208-46 (Rev B) February 2017 Copyright Statement This document must not be reproduced in any way whatsoever, either printed or

More information

11/3/71 SYS MOUNT (II) sys mount; special; name / mount = 21.; not in assembler

11/3/71 SYS MOUNT (II) sys mount; special; name / mount = 21.; not in assembler 11/3/71 SYS MOUNT (II) SYNOPSIS mount -- mount file system sys mount; special; name / mount = 21.; not in assembler mount announces to the system that a removable file system has been mounted on special

More information

VISUDO(8) System Manager s Manual VISUDO(8)

VISUDO(8) System Manager s Manual VISUDO(8) NAME visudo - edit the sudoers file SYNOPSIS visudo [-chqsv] [-f sudoers] [-x output_file] DESCRIPTION visudo edits the sudoers file in a safe fashion, analogous to vipw(8). visudo locks the sudoers file

More information

TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017

TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017 TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory January 2017 If you plan to use Capacity Views, or other views provided by TrueSight Presentation Server, don t waste

More information

UNIX: Using PICO on Central UNIX

UNIX: Using PICO on Central UNIX Using PICO on Central UNIX SYNOPSIS This chapter provides a summary of the basic pico commands. Basic operations such as cursor movement, inserting and deleting text, and searches are covered to give the

More information

12.1 UNDERSTANDING UNIX SHELL PROGRAMMING LANGUAGE: AN INTRODUCTION Writing a Simple Script Executing a Script

12.1 UNDERSTANDING UNIX SHELL PROGRAMMING LANGUAGE: AN INTRODUCTION Writing a Simple Script Executing a Script 12 Shell Programming This chapter concentrates on shell programming. It explains the capabilities of the shell as an interpretive high-level language. It describes shell programming constructs and particulars.

More information

Configuring Kerberos

Configuring Kerberos Kerberos is a secret-key network authentication protocol, developed at the Massachusetts Institute of Technology (MIT), that uses the Data Encryption Standard (DES) cryptographic algorithm for encryption

More information

Network Working Group Request for Comments: 1053 Minnesota Supercomputer Center April 1988

Network Working Group Request for Comments: 1053 Minnesota Supercomputer Center April 1988 Network Working Group Request for Comments: 1053 S. Levy T. Jacobson Minnesota Supercomputer Center April 1988 Telnet X.3 PAD Option Status of this Memo This RFC proposes a new option to Telnet for the

More information

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies: Using Discovery Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology Toolbar.

More information

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Esercitazione Introduzione al linguaggio di shell Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza

More information

Nortel Unified Communications Management. Fundamentals. Release: 1.0 Document Revision: NN

Nortel Unified Communications Management. Fundamentals. Release: 1.0 Document Revision: NN Release: 1.0 Document Revision: 01.02 www.nortel.com NN48014-100. Release: 1.0 Publication: NN48014-100 Document release date: All Rights Reserved. Printed in Canada The information in this document is

More information

XML Transport and Event Notifications

XML Transport and Event Notifications CHAPTER 13 This chapter contains these sections: TTY-Based Transports, page 13-129 Dedicated Connection Based Transports, page 13-131 SSL Dedicated Connection based Transports, page 13-133 TTY-Based Transports

More information

OmniVista 3.5 Discovery Help

OmniVista 3.5 Discovery Help Using Discovery Open the Discovery application by clicking Discovery in the Task Bar, selecting Discovery from the Applications menu, or by clicking the Discovery icon in the Topology Toolbar. The Discovery

More information

TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the

TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the Telnet/SSH TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the local terminal appears to be the terminal at the remote location. Usually establishes

More information

EDIT - DOS/65 EDITOR VERSION 2.1

EDIT - DOS/65 EDITOR VERSION 2.1 EDIT - DOS/65 EDITOR (Copyright) Richard A. Leary 180 Ridge Road Cimarron, CO 81220 This documentation and the associated software is not public domain, freeware, or shareware. It is still commercial documentation

More information

BEAWebLogic RFID. Edge Server. Using the Administration Console

BEAWebLogic RFID. Edge Server. Using the Administration Console BEAWebLogic RFID Edge Server Using the Administration Console Version 2.1 Revised: June 29, 2006 Contents 1. Introduction and Roadmap Document Scope and Audience.............................................

More information

Managing Connections Menus and System Banners

Managing Connections Menus and System Banners Managing Connections Menus and System Banners Management of connections to other hosts, banner messages for router users, and creation of menus for specific user tasks consists of many optional features

More information

Unix Shells and Other Basic Concepts

Unix Shells and Other Basic Concepts CSCI 2132: Software Development Unix Shells and Other Basic Concepts Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Shells Shell = program used by the user to interact with the

More information

Using the Command Line Interface

Using the Command Line Interface CHAPTER 2 Using the Command Line Interface 2.1 Commonly Used Commands This section documents the Cisco Broadband Operating System (CBOS) commands and command arguments that manage the Cisco 67x. CBOS runs

More information

SUDO(8) System Manager s Manual SUDO(8)

SUDO(8) System Manager s Manual SUDO(8) NAME sudo, sudoedit - execute a command as another user SYNOPSIS sudo -h -K -k -V sudo -v [-AknS] [-a type] [-g group] [-h host] [-p prompt] [-u user] sudo -l [-AknS] [-a type] [-g group] [-h host] [-p

More information

Configuring Security with Passwords, Privileges, and Logins

Configuring Security with Passwords, Privileges, and Logins Configuring Security with Passwords, Privileges, and Logins Cisco IOS based networking devices provide several features that can be used to implement basic security for CLI sessions using only the operating

More information

Bashed One Too Many Times. Features of the Bash Shell St. Louis Unix Users Group Jeff Muse, Jan 14, 2009

Bashed One Too Many Times. Features of the Bash Shell St. Louis Unix Users Group Jeff Muse, Jan 14, 2009 Bashed One Too Many Times Features of the Bash Shell St. Louis Unix Users Group Jeff Muse, Jan 14, 2009 What is a Shell? The shell interprets commands and executes them It provides you with an environment

More information

Vi & Shell Scripting

Vi & Shell Scripting Vi & Shell Scripting Comp-206 : Introduction to Week 3 Joseph Vybihal Computer Science McGill University Announcements Sina Meraji's office hours Trottier 3rd floor open area Tuesday 1:30 2:30 PM Thursday

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Persistent Data Transfer Procedure

Persistent Data Transfer Procedure This chapter describes exporting and importing Cisco Secure ACS, Release 5.5 or 5.6 data into Cisco ISE, Release 1.4 system using the migration tool. Exporting Data from Cisco Secure ACS, page 1 Analyzing

More information

Release Notes: Version G Operating System for the HP Procurve Switch 4108GL. Caution: Archive Pre-G Configuration Files

Release Notes: Version G Operating System for the HP Procurve Switch 4108GL. Caution: Archive Pre-G Configuration Files Release Notes: Version G.04.05 Operating System for the HP Procurve Switch 4108GL These release notes include information on the following: Downloading switch software and Documentation from the Web Friendly

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., on page 1 Migrated

More information

Customer Tips. AIX PCL Printing. for the user. Purpose. Creating a New Print Queue. Xerox Multi-function Device. dc04cc0351.

Customer Tips. AIX PCL Printing. for the user. Purpose. Creating a New Print Queue. Xerox Multi-function Device. dc04cc0351. Xerox Multi-function Device Customer Tips January 14, 2005 AIX PCL Printing for the user Purpose The Xerox AIX print driver uses Postscript (instead of PCL) for print formatting. This document describes

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

-1- csh cd. cd alias!! ; set prompt=" pwd % " 16 cd. 17 cd.. 18 his /home% set prompt. alias. yasuoka : root :

-1- csh cd. cd alias!! ; set prompt= pwd %  16 cd. 17 cd.. 18 his /home% set prompt. alias. yasuoka : root : -1- csh 4 root root prompt set prompt pwd % prompt alias alias pwd % alias cd \!\! ; set prompt=" pwd % " pwd % cd. cd.. his 9 set prompt= pwd % 10 cd 11 set prompt=" pwd % " 12 cd.. 13 set prompt= pwd

More information

Lab 5.6b Configuring AAA and RADIUS

Lab 5.6b Configuring AAA and RADIUS Lab 5.6b Configuring AAA and RADIUS Learning Objectives Install CiscoSecure ACS Configure CiscoSecure ACS as a RADIUS server Enable AAA on a router using a remote RADIUS server Topology Diagram Scenario

More information

Linux System Administration

Linux System Administration System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for

More information

Kerberos-enabled applications. Core services for UNIX shell programs and applications. Kerberos environment. Centrify DirectControl Service Library

Kerberos-enabled applications. Core services for UNIX shell programs and applications. Kerberos environment. Centrify DirectControl Service Library Understanding Centrify DirectControl Agents The Centrify DirectControl Agent makes a UNIX, Linux, or Mac OS X computer look and behave like a Windows client computer to Active Directory. The Centrify DirectControl

More information

HP-UX Software and Patching Management Using HP Server Automation

HP-UX Software and Patching Management Using HP Server Automation HP-UX Software and Patching Management Using HP Server Automation Software Version 7.84, released August 2010 Overview... 2 Patch Management for HP-UX Prerequisites... 2 HP-UX Patching Features... 2 Importing

More information

What is the Shell. Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell.

What is the Shell. Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell. What is the Shell Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell. The shell is your interface to the operating system. It acts

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Admin Policy Sets, page 3 TACACS+ Authentication Settings, page

More information

CSE II-Sem)

CSE II-Sem) 1 2 a) Login to the system b) Use the appropriate command to determine your login shell c) Use the /etc/passwd file to verify the result of step b. d) Use the who command and redirect the result to a file

More information

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page

More information

Configuring Lock-and-Key Security (Dynamic Access Lists)

Configuring Lock-and-Key Security (Dynamic Access Lists) Configuring Lock-and-Key Security (Dynamic Access Lists) Feature History Release Modification Cisco IOS For information about feature support in Cisco IOS software, use Cisco Feature Navigator. This chapter

More information

Configuring a Terminal/Comm Server

Configuring a Terminal/Comm Server Configuring a Terminal/Comm Server Document ID: 5466 Introduction Prerequisites Requirements Components Used Conventions Cabling Design Strategy Configure Network Diagram Configurations Command Summary

More information

Advanced Unix Concepts. Satyajit Rai

Advanced Unix Concepts. Satyajit Rai Advanced Unix Concepts Advanced Unix Concepts Satyajit Rai March 17, 2003 March 22, 2003 KReSIT, IIT Bombay 1 Contents Contents Advanced Unix Concepts.......... 1 Contents.................. 2 Process Creation..............

More information

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command. Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,

More information

Tresorit Active Directory Connector V2.0. User s Guide

Tresorit Active Directory Connector V2.0. User s Guide Tresorit Active Directory Connector V2.0 User s Guide Copyright by Tresorit 2018 Contents About Tresorit Active Directory Connector... 4 Features... 4 Synchronization logic... 5 About managed users and

More information