Cisco Wide Area Application Services Command Reference Software Release 4.0.7

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Cisco Wide Area Application Services Command Reference Software Release 4.0.7 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-11817-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCVP, the Cisco logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0709R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco Wide Area Application Services Command Reference © 2007 Cisco Systems, Inc. All rights reserved. CONTENTS Preface xi CHAPTER 1 Using the WAAS Command-Line Interface 1-1 Using Command Modes 1-2 Organization of the WAAS CLI 1-2 Using EXEC Mode 1-3 Using Global Configuration Mode 1-3 Using the Interface Configuration Mode 1-4 Using ACL Configuration Modes 1-5 Command Modes Summary 1-5 Device Mode 1-6 Using Command-Line Processing 1-7 Checking Command Syntax 1-7 Using the no Form of Commands 1-9 Using System Help 1-9 Saving Configuration Changes 1-9 Navigating the WAAS Directories on a WAE 1-9 Directory Descriptions 1-11 Managing WAAS Files Per Device 1-12 CHAPTER 2 Cisco WAAS Software Command Summary 2-1 CHAPTER 3 CLI Commands 3-1 EXEC Mode Commands 3-2 cd 3-3 clear 3-4 clock 3-7 cms 3-8 configure 3-11 copy cdrom 3-12 copy compactflash 3-13 Cisco Wide Area Application Services Command Reference OL-11817-01 iii Contents copy disk 3-14 copy ftp 3-15 copy http 3-19 copy running-config 3-23 copy startup-config 3-24 copy sysreport 3-25 copy system-status 3-27 copy tech-support 3-28 copy tftp 3-29 cpfile 3-31 debug 3-32 delfile 3-38 deltree 3-39 dir 3-40 disable 3-42 disk 3-43 dnslookup 3-47 enable 3-48 exit 3-49 find-pattern 3-50 help 3-52 install 3-53 less 3-54 lls 3-55 ls 3-57 mkdir 3-59 mkfile 3-60 ntpdate 3-61 ping 3-62 pwd 3-63 reload 3-64 rename 3-65 restore 3-66 rmdir 3-70 scp 3-71 Cisco Wide Area Application Services Command Reference iv OL-11817-01 Contents script 3-73 setup 3-74 show aaa accounting 3-75 show adapter 3-77 show alarms 3-78 show arp 3-81 show authentication 3-82 show auto-register 3-84 show banner 3-85 show bypass 3-86 show cdp 3-87 show clock 3-93 show cms 3-95 show debugging 3-98 show device-mode 3-99 show disks 3-101 show flash 3-105 show hardware 3-106 show hosts 3-109 show inetd 3-110 show interface 3-111 show inventory 3-116 show ip access-list 3-117 show ip routes 3-119 show kerberos 3-120 show logging 3-121 show memory 3-122 show ntp 3-123 show policy-engine application 3-125 show policy-engine status 3-129 show print-services 3-131 show processes 3-133 show radius-server 3-135 show running-config 3-137 show services 3-138 Cisco Wide Area Application Services Command Reference OL-11817-01 v Contents show smb-conf 3-139 show snmp 3-141 show ssh 3-147 show standby 3-148 show startup-config 3-150 show statistics authentication 3-152 show statistics content-distribution-network 3-153 show statistics dre 3-154 show statistics dre connection 3-156 show statistics dre peer 3-158 show statistics epm 3-161 show statistics icmp 3-162 show statistics ip 3-164 show statistics netstat 3-167 show statistics radius 3-168 show statistics services 3-170 show statistics snmp 3-171 show statistics tacacs 3-173 show statistics tcp 3-175 show statistics tfo 3-179 show statistics udp 3-181 show statistics wccp 3-182 show statistics windows-domain 3-187 show sysfs 3-189 show tacacs 3-190 show tcp 3-192 show tech-support 3-194 show telnet 3-197 show tfo accelerators 3-198 show tfo auto-discovery 3-199 show tfo bufpool 3-201 show tfo connection 3-203 show tfo filtering 3-205 show tfo status 3-207 show tfo synq 3-208 Cisco Wide Area Application Services Command Reference vi OL-11817-01 Contents show transaction-logging 3-209 show user 3-210 show users administrative 3-211 show version 3-213 show wccp 3-214 show windows-domain 3-220 shutdown 3-222 snmp trigger 3-225 ssh 3-228 tcpdump 3-229 telnet 3-230 terminal 3-231 tethereal 3-232 traceroute 3-234 transaction-log 3-235 type 3-236 type-tail 3-237 undebug 3-239 wafs 3-244 whoami 3-246 windows-domain 3-247 write 3-250 Configuration Mode Commands 3-251 (config) aaa accounting 3-252 (config) adapter 3-256 (config) alarm overload-detect 3-257 (config) asset 3-259 (config) authentication 3-260 (config) auto-register 3-265 (config) banner 3-268 (config) bypass 3-271 (config) cdp 3-273 (config) central-manager 3-275 (config) clock 3-278 (config) cms 3-282 Cisco Wide Area Application Services Command Reference OL-11817-01 vii Contents (config) device mode 3-284 (config) disk 3-286 (config) end 3-288 (config) exec-timeout 3-289 (config) exit 3-290 (config) help 3-291 (config) hostname 3-293 (config) inetd 3-294 (config) interface 3-295 (config) ip 3-302 (config) ip access-list 3-305 (config) kerberos 3-308 (config) kernel 3-310 (config) line 3-311 (config) logging 3-312 (config) no 3-316 (config) ntp 3-318 (config) policy-engine application classifier 3-319 (config) policy-engine application map adaptor EPM 3-321 (config) policy-engine application map adaptor WAFS transport 3-323 (config) policy-engine application map basic delete 3-325 (config) policy-engine application map basic disable 3-326 (config) policy-engine application map basic insert 3-327 (config) policy-engine application map basic list 3-328 (config) policy-engine application map basic move 3-329 (config) policy-engine application map basic name 3-331 (config) policy-engine application map other optimize DRE 3-333 (config) policy-engine application map other optimize full 3-335 (config) policy-engine application map other pass-through 3-336 (config) policy-engine application name 3-337 (config) policy-engine config 3-339 (config) port-channel 3-340 (config) primary-interface 3-341 (config) print-services 3-343 (config) radius-server 3-346 Cisco Wide Area Application Services Command Reference viii OL-11817-01 Contents (config) smb-conf 3-348 (config) snmp-server access-list 3-352 (config) snmp-server community 3-353 (config) snmp-server contact 3-355 (config) snmp-server enable traps 3-356 (config) snmp-server group 3-359 (config) snmp-server host 3-361 (config) snmp-server location 3-363 (config) snmp-server mib 3-364 (config) snmp-server notify inform 3-366 (config) snmp-server user 3-367 (config) snmp-server view 3-369 (config) sshd 3-370 (config) ssh-key-generate 3-373 (config) tacacs 3-374 (config) tcp 3-377 (config) telnet enable 3-380 (config) tfo auto-discovery 3-381 (config) tfo optimize 3-382 (config) tfo tcp keepalive 3-383 (config) tfo tcp optimized-mss 3-384 (config) tfo tcp optimized-receive-buffer 3-385 (config) tfo tcp optimized-send-buffer
Recommended publications
  • Cisco Telepresence Codec SX20 API Reference Guide

    Cisco Telepresence Codec SX20 API Reference Guide

    Cisco TelePresence SX20 Codec API Reference Guide Software version TC6.1 April 2013 Application Programmer Interface (API) Reference Guide Cisco TelePresence SX20 Codec D14949.03 SX20 Codec API Reference Guide TC6.1, April 2013. 1 Copyright © 2013 Cisco Systems, Inc. All rights reserved. Cisco TelePresence SX20 Codec API Reference Guide What’s in this guide? Table of Contents Introduction Using HTTP ....................................................................... 20 Getting status and configurations ................................. 20 TA - ToC - Hidden About this guide .................................................................. 4 The top menu bar and the entries in the Table of Sending commands and configurations ........................ 20 text anchor User documentation ........................................................ 4 Contents are all hyperlinks, just click on them to Using HTTP POST ......................................................... 20 go to the topic. About the API Feedback from codec over HTTP ......................................21 Registering for feedback ................................................21 API fundamentals ................................................................ 9 Translating from terminal mode to XML ......................... 22 We recommend you visit our web site regularly for Connecting to the API ..................................................... 9 updated versions of the user documentation. Go to: Password ........................................................................
  • Introduction to Linux – Part 1

    Introduction to Linux – Part 1

    Introduction to Linux – Part 1 Brett Milash and Wim Cardoen Center for High Performance Computing May 22, 2018 ssh Login or Interactive Node kingspeak.chpc.utah.edu Batch queue system … kp001 kp002 …. kpxxx FastX ● https://www.chpc.utah.edu/documentation/software/fastx2.php ● Remote graphical sessions in much more efficient and effective way than simple X forwarding ● Persistence - can be disconnected from without closing the session, allowing users to resume their sessions from other devices. ● Licensed by CHPC ● Desktop clients exist for windows, mac, and linux ● Web based client option ● Server installed on all CHPC interactive nodes and the frisco nodes. Windows – alternatives to FastX ● Need ssh client - PuTTY ● http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html - XShell ● http://www.netsarang.com/download/down_xsh.html ● For X applications also need X-forwarding tool - Xming (use Mesa version as needed for some apps) ● http://www.straightrunning.com/XmingNotes/ - Make sure X forwarding enabled in your ssh client Linux or Mac Desktop ● Just need to open up a terminal or console ● When running applications with graphical interfaces, use ssh –Y or ssh –X Getting Started - Login ● Download and install FastX if you like (required on windows unless you already have PuTTY or Xshell installed) ● If you have a CHPC account: - ssh [email protected] ● If not get a username and password: - ssh [email protected] Shell Basics q A Shell is a program that is the interface between you and the operating system
  • Windows Command Prompt Cheatsheet

    Windows Command Prompt Cheatsheet

    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
  • NOAA Technical Report NOS NGS 60

    NOAA Technical Report NOS NGS 60

    NOAA Technical Report NOS NGS 60 NAD83 (NSR2007) National Readjustment Final Report Dale G. Pursell Mike Potterfield Rockville, MD August 2008 NOAA Technical Report NOS NGS 60 NAD 83(NSRS2007) National Readjustment Final Report Dale G. Pursell Mike Potterfield Silver Spring, MD August 2008 U.S. DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration National Ocean Service Contents Overview ........................................................................................................................ 1 Part I. Background .................................................................................................... 5 1. North American Datum of 1983 (1986) .......................................................................... 5 2. High Accuracy Reference Networks (HARNs) .............................................................. 5 3. Continuously Operating Reference Stations (CORS) .................................................... 7 4. Federal Base Networks (FBNs) ...................................................................................... 8 5. National Readjustment .................................................................................................... 9 Part II. Data Inventory, Assessment and Input ....................................... 11 6. Preliminary GPS Project Analysis ................................................................................11 7. Master File .....................................................................................................................11
  • A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability

    A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability

    A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability Mosharaf Chowdhury Rachit Agarwal Vyas Sekar Ion Stoica Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2014-172 http://www.eecs.berkeley.edu/Pubs/TechRpts/2014/EECS-2014-172.html October 11, 2014 Copyright © 2014, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability Mosharaf Chowdhury Rachit Agarwal Vyas Sekar Ion Stoica UC Berkeley UC Berkeley Carnegie Mellon University UC Berkeley ABSTRACT Even though our work does not provide new active mea- We present a retrospective and longitudinal study of Internet surement techniques or new datasets, we believe that there is value in this retrospective analysis on several fronts. First, it latency and path stability using three large-scale traceroute provides a historical and longitudinal perspective of Internet datasets collected over several years: Ark and iPlane from path properties that are surprisingly lacking in the measure- 2008 to 2013 and a proprietary CDN’s traceroute dataset spanning 2012 and 2013. Using these different “lenses”, we ment community today. Second, it can help us revisit and revisit classical properties of Internet paths such as end-to- reappraise classical assumptions about path latency and sta- end latency, stability, and of routing graph structure.
  • Older Operating Systems (962-038)

    Older Operating Systems (962-038)

    Instructions: This is an open book pretest. Answer all questions. There are three sections. There are a total of five question pages. The time limit is two hours. Section one: Select only one answer for each multiple-choice question. Each question is worth 2 marks. Q1. Determine which of the following is true concerning DOS filters a. A DOS filter is used to modify information as it passes from EBCDIC text files to the screen. False because it for ASCII not EBCDIC b. The sort command is replaced using the command (dir /w) False because to sort you must use Dir /O:order ex. Dir/O:n c. The command (find /C “supervisor” memo1.txt memo2.txt) is an invalid command. False because it’s a valid command d. The command (type readme.doc | more) produces the same output as (more < readme.doc) True Q2. Determine which of the following is true concerning the tree command a. To indicate branching of directories, the tree command only uses the line characters. False because there are lines b. The deltree command is an enhanced version of the tree command. False, deltree erases a directory, tree shows structure. c. We can use the tree command with redirection symbols. True d. The tree command is an internal DOS command. False, it’s external. Internal means it exists in command.com. Tree.exe is external. Q3. Determine which of the following statement is true concerning variables. a. DOS includes built-in variables and therefore do not allow user defined variables. False – you can define your own variable.
  • Introduction to UNIX at MSI June 23, 2015 Presented by Nancy Rowe

    Introduction to UNIX at MSI June 23, 2015 Presented by Nancy Rowe

    Introduction to UNIX at MSI June 23, 2015 Presented by Nancy Rowe The Minnesota Supercomputing Institute for Advanced Computational Research www.msi.umn.edu/tutorial/ © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Overview • UNIX Overview • Logging into MSI © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Frequently Asked Questions msi.umn.edu > Resources> FAQ Website will be updated soon © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research What’s the difference between Linux and UNIX? The terms can be used interchangeably © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research UNIX • UNIX is the operating system of choice for engineering and scientific workstations • Originally developed in the late 1960s • Unix is flexible, secure and based on open standards • Programs are often designed “to do one simple thing right” • Unix provides ways for interconnecting these simple programs to work together and perform more complex tasks © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Getting Started • MSI account • Service Units required to access MSI HPC systems • Open a terminal while sitting at the machine • A shell provides an interface for the user to interact with the operating system • BASH is the default shell at MSI © 2015 Regents of the University of Minnesota. All rights reserved. Supercomputing Institute for Advanced Computational Research Bastion Host • login.msi.umn.edu • Connect to bastion host before connecting to HPC systems • Cannot run software on bastion host (login.msi.umn.edu) © 2015 Regents of the University of Minnesota.
  • The Linux Command Line

    The Linux Command Line

    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
  • Onetouch 4.0 Scanned Documents

    Onetouch 4.0 Scanned Documents

    · MUL TICS SYSTEM-PROGRAMMERS' MANUAL SECTION BY.2.03 PAGE 1 Publishe¢: 04/03/67 Identification Delete a subtree of the file system hierarchy. del tree E. Q. Bjorkman+· ,. Purpose I \. Deltree is the procedure used by the delete command (BX.8.07)· to delete an entry which points to a non-empty directory. In order to delete svch an entry delete calls deltree to delete the subtree beneath the entry. The method used in deltree can be easily adapted for other tasks which are repeated at all nodes of some tree structure in the file system. Usaoe call deltree (path, failsw); path is the path name of a directory. Fails\-J is.a 1-bit switch indicating on return that some entry of path could not be deleted. Oeltree starts deleting entries of the tree structure beneath ,path at the end nodes (i.e., directories_ that have no directories inferior to them). Deltree reaches these end nodes by constructing a path name of a directory · . immediately inferior to path and then calling itself recursively with that path name until the end'nbdes are r~ached~ Whendeltree has deleted all the entries in an end-node directory which it can delete~ it returns to its caller. )me lementat ion ca 11 .de ltree (path, fail sw); del path char(')'<), f,:lf lsw bit (1); De 1 tree first obtai i'IS the current. ca landar clock time using the PL/I built-in abnormal function ''c1ock_11 .' This time is used later to determine whether entries were added to the directory ~th after deltree started its I.Mork.
  • Misleading Stars: What Cannot Be Measured in the Internet?

    Misleading Stars: What Cannot Be Measured in the Internet?

    Noname manuscript No. (will be inserted by the editor) Misleading Stars: What Cannot Be Measured in the Internet? Yvonne-Anne Pignolet · Stefan Schmid · Gilles Tredan Abstract Traceroute measurements are one of the main in- set can help to determine global properties such as the con- struments to shed light onto the structure and properties of nectivity. today’s complex networks such as the Internet. This arti- cle studies the feasibility and infeasibility of inferring the network topology given traceroute data from a worst-case 1 Introduction perspective, i.e., without any probabilistic assumptions on, e.g., the nodes’ degree distribution. We attend to a scenario Surprisingly little is known about the structure of many im- where some of the routers are anonymous, and propose two portant complex networks such as the Internet. One reason fundamental axioms that model two basic assumptions on is the inherent difficulty of performing accurate, large-scale the traceroute data: (1) each trace corresponds to a real path and preferably synchronous measurements from a large in the network, and (2) the routing paths are at most a factor number of different vantage points. Another reason are pri- 1/α off the shortest paths, for some parameter α 2 (0; 1]. vacy and information hiding issues: for example, network In contrast to existing literature that focuses on the cardi- providers may seek to hide the details of their infrastructure nality of the set of (often only minimal) inferrable topolo- to avoid tailored attacks. gies, we argue that a large number of possible topologies Knowledge of the network characteristics is crucial for alone is often unproblematic, as long as the networks have many applications as well as for an efficient operation of the a similar structure.
  • PAX A920 Mobile Smart Terminal Quick Setup Guide

    PAX A920 Mobile Smart Terminal Quick Setup Guide

    PAX A920 QUICK SETUP GUIDE PAX A920 Mobile Smart Terminal Quick Setup Guide 2018000702 v1.8 1 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE PAX A920 Mobile Terminal Intelligence of an ECR in a handheld point of sale. The PAX A920 is an elegantly designed compact secure portable payment terminal powered by an Android operating system. The A920 comes with a large high definition color display. A thermal printer and includes NFC contactless and electronic signature capture. Great battery life for portable use. 2018000702 v1.8 2 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 1 What’s in The Box The PAX A920 includes the following items in the box. 2018000702 v1.8 3 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 2 A920 Charging Instructions Before starting the A920 battery should be fully charged by plugging the USB to micro USB cord to a PC or an AC power supply and then plug the other end with the micro USB connector into the micro USB port on the left side of the terminal. Charge the battery until full. Note: There is a protective cover on the new battery terminals that must be removed before charging the battery. See Remove and Replace Battery section. 2018000702 v1.8 4 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 3 A920 Buttons and Functions Front Description 6 1 2 7 3 8 9 4 5 2018000702 v1.8 5 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 3.1 A920 Buttons and Functions Front Description 1.
  • Shell Variables

    Shell Variables

    Shell Using the command line Orna Agmon ladypine at vipe.technion.ac.il Haifux Shell – p. 1/55 TOC Various shells Customizing the shell getting help and information Combining simple and useful commands output redirection lists of commands job control environment variables Remote shell textual editors textual clients references Shell – p. 2/55 What is the shell? The shell is the wrapper around the system: a communication means between the user and the system The shell is the manner in which the user can interact with the system through the terminal. The shell is also a script interpreter. The simplest script is a bunch of shell commands. Shell scripts are used in order to boot the system. The user can also write and execute shell scripts. Shell – p. 3/55 Shell - which shell? There are several kinds of shells. For example, bash (Bourne Again Shell), csh, tcsh, zsh, ksh (Korn Shell). The most important shell is bash, since it is available on almost every free Unix system. The Linux system scripts use bash. The default shell for the user is set in the /etc/passwd file. Here is a line out of this file for example: dana:x:500:500:Dana,,,:/home/dana:/bin/bash This line means that user dana uses bash (located on the system at /bin/bash) as her default shell. Shell – p. 4/55 Starting to work in another shell If Dana wishes to temporarily use another shell, she can simply call this shell from the command line: [dana@granada ˜]$ bash dana@granada:˜$ #In bash now dana@granada:˜$ exit [dana@granada ˜]$ bash dana@granada:˜$ #In bash now, going to hit ctrl D dana@granada:˜$ exit [dana@granada ˜]$ #In original shell now Shell – p.