Istruzioni per l'uso HP, Modello HP Firewall Series
Produttore : HP File Size : 1.87 mb File Nome :
Lingua di insegnamento:
|
|
|
|
Vai a scaricare
da questo dispositivo ha anche altre istruzioni :
Facilità d'uso
(string1)(string2)\2 repeats string2, and a matching string must contain string1string2string2. (string1)(string2)\1\2 repeats string1 and string2 respectively, and a matching string must contain string1string2string1string2. For example, [^16A] means to match a string containing any character except 1, 6 or A, and the Matches a single character not matching string can also contain 1, 6 or A, but [^] contained within the brackets. cannot contain only these three characters. For example, [^16A] matches "abc" and "m16", but not 1, 16, or 16A. Matches a character string starting For example, "\" matches word "undo" and string\> with string. string "abcdo". Matches character1character2. For example, "\ba" matches "-a" with "-" being character1 can be any character \bcharacter2 character1, and "a" being character2, but it does except number, letter or underline, not match "2a" or "ba". and \b equals [^A-Za-z0-9_]. Matches a string containing For example, "\Bt" matches "t" in "install", but not \Bcharacter character, and no space is allowed "t" in "big top". before character. 107 Character Meaning Remarks character1\w Matches character1character2. character2 must be a number, letter, or underline, and \w equals [A-Za-z0-9_]. For example, "v\w" matches "vlan" ("v" is character1 and "l" is character2) and "service" ( "i" is character2). \W Equals \b. For example, "\Wa" matches "-a", with "-" being character1, and "a" being character2, but does not match "2a" or "ba". \ Escape character. If a special character listed in this table follows \, the specific meaning of the character is removed. For example, "\\" matches a string containing "\", "\^" matches a string containing "^", and "\\b" matches a string containing "\b". The following are several regular expression examples: # Use | begin user-interface in the display current-configuration command to match the first line of output that contains user-interface to the last line of output. display current-configuration | begin user-interface user-interface con 0 user-interface vty 0 4 authentication-mode none user privilege level 3 # return # Use | exclude Direct in the display ip routing-table command to filter out direct routes and display only the non-direct routes. display ip routing-table | exclude Direct Routing Tables: Public Destination/Mask Proto Pre Cost NextHop Interface 10.1.1.0/24 OSPF 10 2 10.1.1.2 Vlan2 # Use | include Vlan in the display ip routing-table command to filter in route entries that contain Vlan. display ip routing-table | include Vlan Routing Tables: Public Destination/Mask Proto Pre Cost NextHop Interface 192.168.1.0/24 Direct 0 0 192.168.1.42 Vlan999 Configuring user privilege and command levels To avoid unauthorized access, the device defines the user privilege levels and command levels in Table 24. User privilege levels correspond to command levels. A user who has been logged in with a specific privilege level can use only the commands at that level or lower levels. All commands are categorized into four levels: visit, monitor, system, and manage, and are identified from low to high, respectively by 0 through 3. 108 Table 24 Command levels and user privilege levels Level Privilege Default set of commands 0 Visit Includes commands for network diagnosis and commands for accessing an external device. Configuration of commands at this level cannot survive a device restart. Upon device restart, the commands at this level are restored to the default settings. Commands at this level include ping, tracert, telnet and ssh2. 1 Monitor Includes commands for system maintenance and service fault diagnosis. Commands at this level are not saved after being configured. After the device is restarted, the commands at this level are restored to the default settings. Commands at this level include debugging, terminal, refresh, and send. 2 System Includes service configuration commands, including routing configuration commands and commands for configuring services at different network levels. By default, commands at this level include all configuration commands except for those at manage level. 3 Manage Includes commands that influence the basic operation of the system and commands for configuring system support modules. By default, commands at this level involve the configuration commands of file system, FTP, TFTP, Xmodem download, user management, level setting, and parameter settings within a system (which are not defined by any protocols or RFCs). Configuring a user privilege level If the authentication mode on a user interface is scheme, configure a user privilege level for users who access the interface by using the AAA module or directly on the user interface. For SSH users who use public-key authentication, the user privilege level configured directly on the user interface always takes effect. For other ...
Questo manuale è adatto anche per i modelli :
Apparecchiature di rete - HP 8800 Router Series (1.87 mb)