Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 First Published: 12/19/2008 Last Modified: 07/22/2009

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 First Published: 12/19/2008 Last Modified: 07/22/2009 Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 First Published: 12/19/2008 Last Modified: 07/22/2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-18698-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower, Cisco StadiumVision, Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed (Stylized), Cisco Store, Flip Gift Card, and One Million Acts of Green are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Follow Me Browsing, GainMaker, iLYNX, IOS, iPhone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0910R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. © 2010 Cisco Systems, Inc. All rights reserved. CONTENTS Preface xi Audience xi Document Organization xi Document Conventions xii Related Documentation for Nexus 7000 Series NX-OS Software xiii Obtaining Documentation and Submitting a Service Request xiv New and Changed Information 1 New and Changed Information 1 Overview 3 Software Compatibility 3 Common Software Throughout the Data Center 3 Modular Software Design 5 Virtual Device Contexts 5 Serviceability 5 Switched Port Analyzer 5 Ethanalyzer 5 Call Home 5 Online Diagnostics 6 Embedded Event Manager 6 NetFlow 6 Manageability 6 Simple Network Management Protocol 6 Configuration Verification and Rollback 6 Role-Based Access Control 7 Connectivity Management Processor 7 Cisco NX-OS Device Configuration Methods 7 Traffic Routing, Forwarding, and Management 7 Ethernet Switching 7 Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 OL-18698-01 iii Contents IP Routing 8 IP Services 8 IP Multicast 8 Quality of Service 9 Network Security 9 Cisco TrustSec 9 Additional Network Security Features 9 Licensing 10 Supported Standards 10 Using the Cisco NX-OS Setup Utility 17 Information About the Cisco NX-OS Setup Utility 17 Prerequisites for the Setup Utility 19 Setting Up Your Cisco NX-OS Device 19 Where to Go Next 24 Additional References for the Setup Utility 24 Related Documents for the Setup Utility 24 Understanding the Command-Line Interface 25 Information About the CLI Prompt 26 Command Modes 26 EXEC Command Mode 26 Global Configuration Command Mode 26 Interface Configuration Command Mode 27 Subinterface Configuration Command Mode 27 Saving and Restoring a Command Mode 28 Exiting a Configuration Command Mode 28 Command Mode Summary 29 Special Characters 31 Keystroke Shortcuts 31 Abbreviating Commands 34 Completing a Partial Command Name 34 Identifying Your Location in the Command Hierarchy 35 Using the no Form of a Command 35 Configuring CLI Variables 36 About CLI Variables 36 Configuring CLI Session-Only Variables 37 Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 iv OL-18698-01 Contents Configuring Persistent CLI Variables 37 Command Aliases 38 About Command Aliases 38 Defining Command Aliases 38 Command Scripts 39 Running a Command Script 39 Echoing Information to the Terminal 40 Delaying Command Action 41 Context-Sensitive Help 41 Understanding Regular Expressions 42 Special Characters 42 Multiple-Character Patterns 43 Anchoring 43 Searching and Filtering show Command Output 44 Filtering and Searching Keywords 44 grep and egrep Utilities 45 less Utility 46 sed Utility 46 sort Utility 46 Searching and Filtering from the --More-- Prompt 47 Using the Command History 49 Recalling a Command 49 Controlling CLI History Recall 49 Displaying the Command History 49 BIOS Loader Prompt 50 Examples Using the CLI 50 Defining Command Aliases 50 Using CLI Session Variables 50 Using the System-Defined Timestamp Variable 51 Running a Command Script 51 Additional References for the CLI 52 Related Documents for the CLI 52 Feature History for the CLI 52 Configuring Terminal Settings and Sessions 53 Information About Terminal Settings and Sessions 53 Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 OL-18698-01 v Contents Terminal Session Settings 53 Console Port 54 COM1 Port 54 Virtual Terminals 54 Modem Support 54 Virtualization Support for Configuration Files 55 Licensing Requirements for Terminal Settings and Sessions 55 Configuring the Console Port 55 Configuring the COM1 Port 57 Configuring Virtual Terminals 58 Configuring the Inactive Session Timeout 58 Configuring the Session Limit 59 Configuring Modem Connections 60 Enabling a Modem Connection 60 Downloading the Default Initialization String 61 Configuring and Downloading a User-Specified Initialization String 62 Initializing a Modem for a Powered-Up Cisco NX-OS Device 64 Clearing Terminal Sessions 64 Displaying Terminal and Session Information 65 Default Settings for File System Parameters 65 Additional References for Terminal Settings and Sessions 65 Related Documents for Terminal Settings and Sessions 65 Basic Device Management 67 Information About Basic Device Management 67 Device Hostname 67 Message-of-the-Day Banner 68 Device Clock 68 Time Zone and Summer Time (Daylight Saving Time) 68 User Sessions 68 Virtualization Support for Basic Device Management 68 Licensing Requirements for Basic Device Management 68 Changing the Device Hostname 68 Configuring the MOTD Banner 69 Configuring the Time Zone 70 Configuring Summer Time (Daylight Saving Time) 71 Cisco Nexus 7000 Series NX-OS Fundamentals Configuration Guide, Release 4.1 vi OL-18698-01 Contents Manually Setting the Device Clock 72 Managing Users 72 Displaying Information about the User Sessions 73 Sending a Message to Users 73 Verifying the Device Configuration 73 Default Settings for Basic Device Parameters 74 Additional References for Basic Device Management 74 Related Documents for Basic Device Management 74 Feature History for Basic Device Management 74 Using the Device File Systems, Directories, and Files 75 Information About the Device File Systems, Directories, and Files 75 File Systems 75 Directories 77 Files 77 Virtualization Support for File Systems 77 Licensing Requirements for File Systems, Directories, and Files 77 Formatting External Flash Devices 77 Working with Directories 78 Identifying the Current Directory 78 Changing the Current Directory 78 Creating a Directory 79 Displaying Directory Contents 79 Deleting a Directory 80 Accessing Directories
Recommended publications
  • Edit Bibliographic Records
    OCLC Connexion Browser Guides Edit Bibliographic Records Last updated: May 2014 6565 Kilgour Place, Dublin, OH 43017-3395 www.oclc.org Revision History Date Section title Description of changes May 2014 All Updated information on how to open the diacritic window. The shortcut key is no longer available. May 2006 1. Edit record: basics Minor updates. 5. Insert diacritics Revised to update list of bar syntax character codes to reflect and special changes in character names and to add newly supported characters characters. November 2006 1. Edit record: basics Minor updates. 2. Editing Added information on guided editing for fields 541 and 583, techniques, template commonly used when cataloging archival materials. view December 2006 1. Edit record: basics Updated to add information about display of WorldCat records that contain non-Latin scripts.. May 2007 4. Validate record Revised to document change in default validation level from None to Structure. February 2012 2 Editing techniques, Series added entry fields 800, 810, 811, 830 can now be used to template view insert data from a “cited” record for a related series item. Removed “and DDC” from Control All commands. DDC numbers are no longer controlled in Connexion. April 2012 2. Editing New section on how to use the prototype OCLC Classify service. techniques, template view September 2012 All Removed all references to Pathfinder. February 2013 All Removed all references to Heritage Printed Book. April 2013 All Removed all references to Chinese Name Authority © 2014 OCLC Online Computer Library Center, Inc. 6565 Kilgour Place Dublin, OH 43017-3395 USA The following OCLC product, service and business names are trademarks or service marks of OCLC, Inc.: CatExpress, Connexion, DDC, Dewey, Dewey Decimal Classification, OCLC, WorldCat, WorldCat Resource Sharing and “The world’s libraries.
    [Show full text]
  • 14 * (Asterisk), 169 \ (Backslash) in Smb.Conf File, 85
    ,sambaIX.fm.28352 Page 385 Friday, November 19, 1999 3:40 PM Index <> (angled brackets), 14 archive files, 137 * (asterisk), 169 authentication, 19, 164–171 \ (backslash) in smb.conf file, 85 mechanisms for, 35 \\ (backslashes, two) in directories, 5 NT domain, 170 : (colon), 6 share-level option for, 192 \ (continuation character), 85 auto services option, 124 . (dot), 128, 134 automounter, support for, 35 # (hash mark), 85 awk script, 176 % (percent sign), 86 . (period), 128 B ? (question mark), 135 backup browsers ; (semicolon), 85 local master browser, 22 / (slash character), 129, 134–135 per local master browser, 23 / (slash) in shares, 116 maximum number per workgroup, 22 _ (underscore) 116 backup domain controllers (BDCs), 20 * wildcard, 177 backups, with smbtar program, 245–248 backwards compatibility elections and, 23 for filenames, 143 A Windows domains and, 20 access-control options (shares), 160–162 base directory, 40 accessing Samba server, 61 .BAT scripts, 192 accounts, 51–53 BDCs (backup domain controllers), 20 active connections, option for, 244 binary vs. source files, 32 addresses, networking option for, 106 bind interfaces only option, 106 addtosmbpass executable, 176 bindings, 71 admin users option, 161 Bindings tab, 60 AFS files, support for, 35 blocking locks option, 152 aliases b-node, 13 multiple, 29 boolean type, 90 for NetBIOS names, 107 bottlenecks, 320–328 alid users option, 161 reducing, 321–326 announce as option, 123 types of, 320 announce version option, 123 broadcast addresses, troubleshooting, 289 API
    [Show full text]
  • Legacy Character Sets & Encodings
    Legacy & Not-So-Legacy Character Sets & Encodings Ken Lunde CJKV Type Development Adobe Systems Incorporated bc ftp://ftp.oreilly.com/pub/examples/nutshell/cjkv/unicode/iuc15-tb1-slides.pdf Tutorial Overview dc • What is a character set? What is an encoding? • How are character sets and encodings different? • Legacy character sets. • Non-legacy character sets. • Legacy encodings. • How does Unicode fit it? • Code conversion issues. • Disclaimer: The focus of this tutorial is primarily on Asian (CJKV) issues, which tend to be complex from a character set and encoding standpoint. 15th International Unicode Conference Copyright © 1999 Adobe Systems Incorporated Terminology & Abbreviations dc • GB (China) — Stands for “Guo Biao” (国标 guóbiâo ). — Short for “Guojia Biaozhun” (国家标准 guójiâ biâozhün). — Means “National Standard.” • GB/T (China) — “T” stands for “Tui” (推 tuî ). — Short for “Tuijian” (推荐 tuîjiàn ). — “T” means “Recommended.” • CNS (Taiwan) — 中國國家標準 ( zhôngguó guójiâ biâozhün) in Chinese. — Abbreviation for “Chinese National Standard.” 15th International Unicode Conference Copyright © 1999 Adobe Systems Incorporated Terminology & Abbreviations (Cont’d) dc • GCCS (Hong Kong) — Abbreviation for “Government Chinese Character Set.” • JIS (Japan) — 日本工業規格 ( nihon kôgyô kikaku) in Japanese. — Abbreviation for “Japanese Industrial Standard.” — 〄 • KS (Korea) — 한국 공업 규격 (韓國工業規格 hangug gongeob gyugyeog) in Korean. — Abbreviation for “Korean Standard.” — ㉿ — Designation change from “C” to “X” on August 20, 1997. 15th International Unicode Conference Copyright © 1999 Adobe Systems Incorporated Terminology & Abbreviations (Cont’d) dc • TCVN (Vietnam) — Tiu Chun Vit Nam in Vietnamese. — Means “Vietnamese Standard.” • CJKV — Chinese, Japanese, Korean, and Vietnamese. 15th International Unicode Conference Copyright © 1999 Adobe Systems Incorporated What Is A Character Set? dc • A collection of characters that are intended to be used together to create meaningful text.
    [Show full text]
  • The Luacode Package
    The luacode package Manuel Pégourié-Gonnard <[email protected]> v1.2a 2012/01/23 Abstract Executing Lua code from within TEX with \directlua can sometimes be tricky: there is no easy way to use the percent character, counting backslashes may be hard, and Lua comments don’t work the way you expect. This package provides the \luaexec command and the luacode(*) environments to help with these problems, as well as helper macros and a debugging mode. Contents 1 Documentation1 1.1 Lua code in LATEX...................................1 1.2 Helper macros......................................3 1.3 Debugging........................................3 2 Implementation3 2.1 Preliminaries......................................4 2.2 Internal code......................................5 2.3 Public macros and environments...........................7 3 Test file 8 1 Documentation 1.1 Lua code in LATEX For an introduction to the most important gotchas of \directlua, see lualatex-doc.pdf. Before presenting the tools in this package, let me insist that the best way to manage a non- trivial piece of Lua code is probably to use an external file and source it from Lua, as explained in the cited document. \luadirect First, the exact syntax of \directlua has changed along version of LuaTEX, so this package provides a \luadirect command which is an exact synonym of \directlua except that it doesn’t have the funny, changing parts of its syntax, and benefits from the debugging facilities described below (1.3).1 The problems with \directlua (or \luadirect) are mainly with TEX special characters. Actually, things are not that bad, since most special characters do work, namely: _, ^, &, $, {, }. Three are a bit tricky but they can be managed with \string: \, # and ~.
    [Show full text]
  • List of Approved Special Characters
    List of Approved Special Characters The following list represents the Graduate Division's approved character list for display of dissertation titles in the Hooding Booklet. Please note these characters will not display when your dissertation is published on ProQuest's site. To insert a special character, simply hold the ALT key on your keyboard and enter in the corresponding code. This is only for entering in a special character for your title or your name. The abstract section has different requirements. See abstract for more details. Special Character Alt+ Description 0032 Space ! 0033 Exclamation mark '" 0034 Double quotes (or speech marks) # 0035 Number $ 0036 Dollar % 0037 Procenttecken & 0038 Ampersand '' 0039 Single quote ( 0040 Open parenthesis (or open bracket) ) 0041 Close parenthesis (or close bracket) * 0042 Asterisk + 0043 Plus , 0044 Comma ‐ 0045 Hyphen . 0046 Period, dot or full stop / 0047 Slash or divide 0 0048 Zero 1 0049 One 2 0050 Two 3 0051 Three 4 0052 Four 5 0053 Five 6 0054 Six 7 0055 Seven 8 0056 Eight 9 0057 Nine : 0058 Colon ; 0059 Semicolon < 0060 Less than (or open angled bracket) = 0061 Equals > 0062 Greater than (or close angled bracket) ? 0063 Question mark @ 0064 At symbol A 0065 Uppercase A B 0066 Uppercase B C 0067 Uppercase C D 0068 Uppercase D E 0069 Uppercase E List of Approved Special Characters F 0070 Uppercase F G 0071 Uppercase G H 0072 Uppercase H I 0073 Uppercase I J 0074 Uppercase J K 0075 Uppercase K L 0076 Uppercase L M 0077 Uppercase M N 0078 Uppercase N O 0079 Uppercase O P 0080 Uppercase
    [Show full text]
  • The Brill Typeface User Guide & Complete List of Characters
    The Brill Typeface User Guide & Complete List of Characters Version 2.06, October 31, 2014 Pim Rietbroek Preamble Few typefaces – if any – allow the user to access every Latin character, every IPA character, every diacritic, and to have these combine in a typographically satisfactory manner, in a range of styles (roman, italic, and more); even fewer add full support for Greek, both modern and ancient, with specialised characters that papyrologists and epigraphers need; not to mention coverage of the Slavic languages in the Cyrillic range. The Brill typeface aims to do just that, and to be a tool for all scholars in the humanities; for Brill’s authors and editors; for Brill’s staff and service providers; and finally, for anyone in need of this tool, as long as it is not used for any commercial gain.* There are several fonts in different styles, each of which has the same set of characters as all the others. The Unicode Standard is rigorously adhered to: there is no dependence on the Private Use Area (PUA), as it happens frequently in other fonts with regard to characters carrying rare diacritics or combinations of diacritics. Instead, all alphabetic characters can carry any diacritic or combination of diacritics, even stacked, with automatic correct positioning. This is made possible by the inclusion of all of Unicode’s combining characters and by the application of extensive OpenType Glyph Positioning programming. Credits The Brill fonts are an original design by John Hudson of Tiro Typeworks. Alice Savoie contributed to Brill bold and bold italic. The black-letter (‘Fraktur’) range of characters was made by Karsten Lücke.
    [Show full text]
  • \ (Backslash), 119 ' (Single Apostrophe
    Index \ (backslash), 119 basin of attraction, 273 basis, 58, 65, 86, 87, 89, 97, 101 ' (single apostrophe), 116 definition of, 58 of a linear functional, 196 : (colon), 117 of eigenvectors, 155, 158, 245 orthogonal, 87 orthonormal, 73, 81 A vectors, 71 Bass-Gura formula, 416 a posteriori estimate, 483 Bellman’s principle of optimality, a priori estimate, 483 459 ACKER, 413, 530 bias point, 30 Ackermann’s formula, 413, 416, BIBO stability, 298 437 of discrete-time systems, 295 additivity, 5 of time-invariant systems, 297 adjoint operator, 116 testing for, 298 definition of, 116 BIBS stability, 298 adjoint system, 265 bijective mapping, 60 affine system, 36 bilinear form, 195, 222 A-invariant subspaces as inner products, 199 definition of, 147 definition of, 197 algebra, 114 block matrices, 515 algebraic multiplicity, 158, 159, bottom-up method, 159 160 bounded operator, 116 analytic function, 30, 210 angle, 70 anticipatory system, 5 C associativity, 50, 83, 516 augmented system, 433, 437, 502 C2D, 258, 531 automobile suspension, 38 CANON, 155, 326, 531 canonical form, 18, 155 CARE, 473, 474, 478, 532 B Cauchy-Schwarz inequality, 69, balanced model, 401 275 balanced realization, 387, 388 causality BALREAL, 388, 530 definition of, 5 Banach space, 71 Cayley-Hamilton theorem, 209, 210, 212, 313, 329 562 Fundamentals of linear State Space Systems CDF2RDF, 377, 533 geometric interpretation, 331 center, 245, 274 grammian, 340, 343, 388, 390 chains of generalized eigenvectors, index, 422-424 162 matrix, 313 change of basis, 62, 64, 86, 236, of
    [Show full text]
  • Adobe Framemaker 9 Character Sets
    ADOBE®® FRAMEMAKER 9 Character Sets © 2008 Adobe Systems Incorporated. All rights reserved. Adobe® FrameMaker® 9 Character Sets for Windows® If this guide is distributed with software that includes an end-user agreement, this guide, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by any such license, no part of this guide may be reproduced, stored in a retrieval system, or trans- mitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of Adobe Systems Incorporated. Please note that the content in this guide is protected under copyright law even if it is not distributed with software that includes an end-user license agreement. The content of this guide is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Adobe Systems Incorpo- rated. Adobe Systems Incorporated assumes no responsibility or liability for any errors or inaccuracies that may appear in the informational content contained in this guide. Please remember that existing artwork or images that you may want to include in your project may be protected under copyright law. The unauthorized incorporation of such material into your new work could be a violation of the rights of the copyright owner. Please be sure to obtain any permission required from the copyright owner. Any references to company names in sample templates are for demonstration purposes only and are not intended to refer to any actual organization.
    [Show full text]
  • Tcl Basics CHAPTER 1
    I. Tcl Basics CHAPTER 1 Tcl Fundamentals 1 This chapter describes the basic syntax rules for the Tcl scripting language. It describes the basic mechanisms used by the Tcl interpreter: substitution and grouping. It touches lightly on the following Tcl commands: puts, format, set, expr, string, while, incr, and proc. Tcl is a string-based command lan- guage. The language has only a few fundamental constructs and relatively little syntax, which makes it easy to learn. The Tcl syntax is meant to be simple. Tcl is designed to be a glue that assembles software building blocks into applications. A simpler glue makes the job easier. In addition, Tcl is interpreted when the application runs. The interpreter makes it easy to build and refine your applica- tion in an interactive manner. A great way to learn Tcl is to try out commands interactively. If you are not sure how to run Tcl on your system, see Chapter 2 for instructions for starting Tcl on UNIX, Windows, and Macintosh systems. This chapter takes you through the basics of the Tcl language syntax. Even if you are an expert programmer, it is worth taking the time to read these few pages to make sure you understand the fundamentals of Tcl. The basic mecha- nisms are all related to strings and string substitutions, so it is fairly easy to visualize what is going on in the interpreter. The model is a little different from some other programming languages with which you may already be familiar, so it is worth making sure you understand the basic concepts.
    [Show full text]
  • Using the Command-Line Interface
    APPENDIX C Using the Command-Line Interface This appendix describes how to use the CLI on the security appliance, and includes the following sections: • Firewall Mode and Security Context Mode, page C-1 • Command Modes and Prompts, page C-2 • Syntax Formatting, page C-3 • Abbreviating Commands, page C-3 • Command-Line Editing, page C-3 • Command Completion, page C-4 • Command Help, page C-4 • Filtering show Command Output, page C-4 • Command Output Paging, page C-5 • Adding Comments, page C-6 • Text Configuration Files, page C-6 Note The CLI uses similar syntax and other conventions to the Cisco IOS CLI, but the security appliance operating system is not a version of Cisco IOS software. Do not assume that a Cisco IOS CLI command works with or has the same function on the security appliance. Firewall Mode and Security Context Mode The security appliance runs in a combination of the following modes: • Transparent firewall or routed firewall mode The firewall mode determines if the security appliance runs as a Layer 2 or Layer 3 firewall. • Multiple context or single context mode The security context mode determines if the security appliance runs as a single device or as multiple security contexts, which act like virtual devices. Some commands are only available in certain modes. Cisco Security Appliance Command Line Configuration Guide OL-10088-02 C-1 Appendix C Using the Command-Line Interface Command Modes and Prompts Command Modes and Prompts The security appliance CLI includes command modes. Some commands can only be entered in certain modes. For example, to enter commands that show sensitive information, you need to enter a password and enter a more privileged mode.
    [Show full text]
  • Latex Basics
    Essential LATEX ++ Jon Warbrick with additions by David Carlisle, Michel Goossens, Sebastian Rahtz, Adrian Clark January 1994 Contents 1 Introduction ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ 2 2 How Does LATEX Work? ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ 2 3 A Sample LATEX File ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ 3 1 Simple Text ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ 5 4 Document Classes and Options ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ 6 5 Environments ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ 7 6 Type Styles ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ 9 7 Sectioning Commands and Tables of Contents ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ 10 8 Producing Special Symbols ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ 10 9 Titles ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ 11 10 Tabular Material ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ 11 11 Tables and Figures ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ 12 12 Cross-References and Citations ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ 13 13 Mathematical Typesetting ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ 14 14 What about $'s? £ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ £ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ 16 15 Letters ¢ ¡ ¢ ¡ ¡ ¢ ¡ ¢ ¡ £ ¡ ¡ ¢ ¡ ¢ ¡ ¢ ¡ ¡ ¢ ¡ £ ¡ ¢ ¡ ¡ ¢ ¡
    [Show full text]
  • Ddlm Comments (Summary) This Document Contains an Edited
    DDLm comments (summary) This document contains an edited version of the comments received by I.D.Brown on the Discussion Paper concerning decisions that COMCIFS needs to make related to the methods Dictionary Definition Language (DDLm). Not all these comments were posted on the discussion list and so will not have been seen before. The comments are edited according to subject into a readable (?) sequence so as to provide a lead into the discussions at the closed COMCIFS meeting at the IUCr Congress in Osaka in August 2008. Parts of the original Discussion Paper are included to provide context. [Editorial changes and comments are enclosed in square brackets.] Anyone interested in pursuing these discussions in Osaka is invited by the Chair to attend the closed COMCIFS meeting to be held during the IUCr Congress. 2008-08-25:1300 in room 804 2008-08-28:1300 in room 804 0. There are two important CIF principles that are relevant. Original: 1. CIF (normally) defines only one data item for a given piece of information and the format of that item is the one closest to the natural representation of the quantity (rather than a format in common use or one designed for ease in computation). For example, the CIF specifies which units that are to be used and alternative units are not permitted. 2. A given piece of information may appear only once in a given datablock. This is necessary to ensure uniqueness of the reported value. If the same information is given twice there could be an ambiguity if the two values do not agree.
    [Show full text]