Ibypass hd – Net Optics iBypass HD User Manual

Page 22

Advertising
background image

18

iBypass HD

login as: ibypass

# SSH login as "ibypass"

[email protected]'s password:

# password is not displayed (default "netoptics")

Last login: Thu Sep 4 09:40:31 2008 from 10.30.1.62

***********************************************************

* Net Optics Command Line Interface (CLI) *

* for iBypass HD *

* *

* Copyright (c) 2010 by Net Optics, Inc. *

* *

* Restricted Rights Legend *

* *

* Use, duplication, or disclosure by the Government is *

* subject to restrictions as set forth in subparagraph *

* (c) of the Commercial Computer Software - Restricted *

* Rights clause at FAR sec. 52.227-19 and subparagraph *

* (c)(1)(ii) of the Rights in Technical Data and Computer *

* Software clause at DFARS sec. 252.227-7013. *

* *

* Net Optics, Inc. *

* 5303 Betsy Ross Drive *

* Santa Clara, California 95054 *

* (408) 737-7777 *

* e-mail: [email protected] *

* *

***********************************************************

login user: admin

# CLI login as "ibypass"

password:

# password is not displayed (default "netoptics")

Net Optics> help

commit - activate pending configuration changes

config - delete, list, load, save, and show configure files

date - show and set system date

heartbeat - configure dbm heart beat

help - view CLI usage

history - display command history list

image - show and switch boot image

logout - logout current CLI session

module - show installed system modules and configure dbm modules

passwd - change password for SSH user account

ping - ping <ipaddr>

port - configure ports and show port statistics

security - manage rsa key for ssh

segment - configure segment parameters

server - configure network server parameters

sysip - show and set system IP address

system - restart system

time - show and set system time

upgrade - upgrade alternate boot and fpga image file

user - manage user accounts

quit or exit - exit current CLI session

Net Optics>

Figure 13: Shell login as "ibypass" and CLI login as "admin"

Advertising