Cisco SD-WAN Command Reference Americas Headquarters Cisco Systems, Inc

Total Page:16

File Type:pdf, Size:1020Kb

Cisco SD-WAN Command Reference Americas Headquarters Cisco Systems, Inc Cisco SD-WAN Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2019–2021 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Read Me First 1 Read Me First 2 CHAPTER 2 What's New for Cisco IOS XE (SD-WAN) and Cisco SD-WAN 3 What's New in Cisco IOS XE (SD-WAN) and Cisco SD-WAN Releases 4 CHAPTER 3 Command-Line Interface 5 CLI Configuration Commands 6 CLI Operational Commands 7 CLI Overview 8 CHAPTER 4 Configuration Commands 19 Configuration Commands 28 Overview of Configuration Commands 29 aaa 30 access-list 34 access-list 36 accounting-interval 38 acct-req-attr 40 action 42 action 57 address-family 59 address-pool 62 admin-auth-order 63 admin-state 65 admin-tech-on-failure 67 Cisco SD-WAN Command Reference iii Contents advertise 68 age-time 70 allow-local-exit 72 allow-same-site-tunnels 73 allow-service 75 api-key 78 app-probe-class 79 app-route-policy 80 app-visibility 82 applications 84 apply-policy 86 archive 90 area 92 arp 94 arp-timeout 96 auth-fail-vlan 97 auth-fallback 99 auth-order 101 auth-order 102 auth-reject-vlan 105 auth-req-attr 107 authentication 109 authentication-type 111 authentication-type 113 auto-cost reference-bandwidth 116 auto-sig-tunnel-probing 118 auto-rp 119 autonegotiate 120 bandwidth-downstream 122 bandwidth-upstream 124 banner login 126 banner motd 128 best-path 130 bfd app-route 132 Cisco SD-WAN Command Reference iv Contents bfd color 134 bfd app-route color 137 bgp 138 bind 140 block-icmp-error 142 block-non-source-ip 144 bridge 145 capability-negotiate 147 carrier 148 cellular 150 cflowd-template 152 channel 154 channel-bandwidth 156 cipher-suite 158 class-map 160 clear-dont-fragment 162 clock 163 cloud-qos 164 cloud-qos-service-side 167 cloudexpress 170 collector 171 color 173 community 176 compatible rfc1583 178 connections-limit 180 console-baud-rate 182 contact 183 container 184 control 185 control-connections 186 control-direction 188 control-policy 190 control-session-pps 191 controller-group-id 192 Cisco SD-WAN Command Reference v Contents controller-group-list 193 controller-mode 195 controller-send-path-limit 196 cost 197 country 198 crypto pki trustpoint 200 crypto pki authenticate 202 crypto pki enroll 204 crypto pki import 206 das 207 data-policy 210 data-security 213 dead-interval 215 dead-peer-detection 217 default-action 219 default-information originate 222 default-vlan 224 description 226 device-groups 227 dhcp-helper 228 dhcp-server 230 dialer down-with-vInterface 232 direction 233 discard-rejected 235 distance 236 distance 238 dns 240 domain-id 241 dot1x 242 duplex 247 ebgp-multihop 249 ecmp-hash-key 251 ecmp-limit 252 eco-friendly-mode 253 Cisco SD-WAN Command Reference vi Contents eigrp 254 encapsulation 256 exclude 259 exclude-controller-group-list 261 flow-active-timeout 263 flow-control 265 flow-inactive-timeout 266 flow-sampling-interval 268 flow-visibility 270 gps-location 271 graceful-restart 272 group 273 group 275 group 276 guard-interval 277 guest-vlan 279 hello-interval 281 hello-interval 283 hello-interval 285 hello-tolerance 287 hold-time 289 host 291 host-mode 293 host-name 295 host-policer-pps 296 icmp-error-pps 297 icmp-redirect-disable 298 idle-timeout 299 igmp 300 ike 302 implicit-acl-logging 304 interface 306 interface 311 interface 314 Cisco SD-WAN Command Reference vii Contents interface 316 interface 318 interface 320 interface gre 322 interface ipsec 324 interface irb 327 interface ppp 329 integrity-type 331 ip address 332 ip address-list 334 ip dhcp-client 336 ip gre-route 338 ip ipsec-route 340 ip route 342 ip secondary-address 344 ipsec 346 ipsec 347 iptables-enable 348 ipv6 address 349 ipv6 dhcp-client 351 ipv6 route 353 join-group 355 join-prune-interval 357 keepalive 359 last-resort-circuit 361 lease-time 363 lists 365 local-interface-list 374 location 375 location 377 log-frequency 378 log-translations 380 logging disk 382 logging host 388 Cisco SD-WAN Command Reference viii Contents logging tls-profile 390 logging server 391 logs 394 low-bandwidth-link 396 mac-accounting 398 mac-address 399 mac-authentication-bypass 400 match 402 match 405 max-clients 416 max-control-connections 418 max-controllers 420 max-leases 421 max-macs 422 max-metric 423 max-omp-sessions 425 mgmt-security 427 mirror 429 mode 431 mtu 432 multicast-buffer-percent 434 multicast-replicator 435 name 437 name 438 nas-identifier 439 nas-ip-address 441 nat 443 nat-refresh-interval 445 natpool 447 neighbor 448 network 450 next-hop-self 452 node-type 453 nssa 455 Cisco SD-WAN Command Reference ix Contents ntp 457 offer-time 460 omp 462 on-demand enable 464 on-demand idle-timeout 465 options 466 organization-name 468 orgid 469 ospf 470 ospfv3 authentication 472 overlay-as 474 overload 475 parameter-map type umbrella global 477 parent 478 passive-interface 480 password 481 peer 483 perfect-forward-secrecy 485 pim 487 pmtu 488 policer 489 policy 493 policy ipv6 500 port-forward 502 port-hop 504 port-offset 506 port-scan 508 ppp 510 pppoe-client 512 priority 514 probe 516 probe-path branch 518 probe-path gateway 519 profile 520 Cisco SD-WAN Command Reference x Contents profile 523 propagate-aspath 525 propagate-community 526 qos-map 527 qos-scheduler 529 radius 532 radius-servers 536 range 540 reauthentication 541 redistribute 543 refresh 546 rekey 548 rekey 550 remote-as 552 replay-window 553 replay-window 555 replicator-selection 556 respond-to-ping 557 retransmit-interval 559 rewrite-rule 561 route-consistency-check 563 route-export 564 route-import 565 route-map 566 route-policy 568 router 570 router-id 572 router-id 573 secret 574 security 575 send-community 576 send-ext-community 577 send-path-limit 578 sense level 579 Cisco SD-WAN Command Reference xi Contents service 581 service-insertion appnav-controller-group appqoe 585 service-insertion service-node-group appqoe 587 set ip next-hop verify-availability 588 set platform software trace 590 shaping-rate 592 shutdown 594 site-id 596 sla-class 597 snmp 599 sp-organization-name 600 speed 601 spt-threshold 603 ssid 604 static 606 static-ingress-qos 609 static-lease 610 stub 612 system 613 system-ip 617 system-tunnel-mtu 619 system patch-confirm 620 table-map 621 tacacs 622 tcp-mss-adjust 625 tcp-optimization 627 tcp-optimization-enabled 628 tcp-syn-flood-limit 629 tcp-timeout 631 technology 633 template-refresh 635 timeout inactivity 637 timer 639 timers 641 Cisco SD-WAN Command Reference xii Contents timers 643 timers 645 tloc-extension 648 tloc-extension-gre-from 650 tloc-extension-gre-to 652 track 654 track-default-gateway 656 track-interface-tag 657 track-list 659 track-transport 661 tracker 662 trap group 665 trap target 668 tunnel-destination 670 tunnel-destination 672

  1432
Recommended publications
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • NETSTAT Command
    NETSTAT Command | NETSTAT Command | Use the NETSTAT command to display network status of the local host. | | ┌┐────────────── | 55──NETSTAT─────6─┤ Option ├─┴──┬────────────────────────────────── ┬ ─ ─ ─ ────────────────────────────────────────5% | │┌┐───────────────────── │ | └─(──SELect───6─┤ Select_String ├─┴ ─ ┘ | Option: | ┌┐─COnn────── (1, 2) ──────────────── | ├──┼─────────────────────────── ┼ ─ ──────────────────────────────────────────────────────────────────────────────┤ | ├─ALL───(2)──────────────────── ┤ | ├─ALLConn─────(1, 2) ────────────── ┤ | ├─ARp ipaddress───────────── ┤ | ├─CLients─────────────────── ┤ | ├─DEvlinks────────────────── ┤ | ├─Gate───(3)─────────────────── ┤ | ├─┬─Help─ ┬─ ───────────────── ┤ | │└┘─?──── │ | ├─HOme────────────────────── ┤ | │┌┐─2ð────── │ | ├─Interval─────(1, 2) ─┼───────── ┼─ ┤ | │└┘─seconds─ │ | ├─LEVel───────────────────── ┤ | ├─POOLsize────────────────── ┤ | ├─SOCKets─────────────────── ┤ | ├─TCp serverid───(1) ─────────── ┤ | ├─TELnet───(4)───────────────── ┤ | ├─Up──────────────────────── ┤ | └┘─┤ Command ├───(5)──────────── | Command: | ├──┬─CP cp_command───(6) ─ ┬ ────────────────────────────────────────────────────────────────────────────────────────┤ | ├─DELarp ipaddress─ ┤ | ├─DRop conn_num──── ┤ | └─RESETPool──────── ┘ | Select_String: | ├─ ─┬─ipaddress────(3) ┬ ─ ───────────────────────────────────────────────────────────────────────────────────────────┤ | ├─ldev_num─────(4) ┤ | └─userid────(2) ─── ┘ | Notes: | 1 Only ALLCON, CONN and TCP are valid with INTERVAL. | 2 The userid
    [Show full text]
  • Command-Line IP Utilities This Document Lists Windows Command-Line Utilities That You Can Use to Obtain TCP/IP Configuration Information and Test IP Connectivity
    Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 Command-Line IP Utilities This document lists Windows command-line utilities that you can use to obtain TCP/IP configuration information and test IP connectivity. Command parameters and uses are listed for the following utilities in Tables 1 through 9: ■ Arp ■ Ipconfig ■ Netsh ■ Netstat ■ Pathping ■ Ping ■ Route ■ Tracert ARP The Arp utility reads and manipulates local ARP tables (data link address-to-IP address tables). Syntax arp -s inet_addr eth_addr [if_addr] arp -d inet_addr [if_addr] arp -a [inet_address] [-N if_addr] [-v] Table 1 ARP command parameters and uses Parameter Description -a or -g Displays current entries in the ARP cache. If inet_addr is specified, the IP and data link address of the specified computer appear. If more than one network interface uses ARP, entries for each ARP table appear. inet_addr Specifies an Internet address. -N if_addr Displays the ARP entries for the network interface specified by if_addr. -v Displays the ARP entries in verbose mode. -d Deletes the host specified by inet_addr. -s Adds the host and associates the Internet address inet_addr with the data link address eth_addr. The physical address is given as six hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr Specifies physical address. if_addr If present, this specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface will be used. Pyles, Carrell, and Tittel 1 Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 IPCONFIG The Ipconfig utility displays and modifies IP address configuration information.
    [Show full text]
  • SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4
    SUSE Linux Enterprise Server 11 SP4 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 11 SP4 Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xi 1 Available Documentation xii 2 Feedback xiv 3 Documentation Conventions xv I BASICS 1 1 General Notes on System Tuning 2 1.1 Be Sure What Problem to Solve 2 1.2 Rule Out Common Problems 3 1.3 Finding the Bottleneck 3 1.4 Step-by-step Tuning 4 II SYSTEM MONITORING 5 2 System Monitoring Utilities 6 2.1 Multi-Purpose Tools 6 vmstat 7
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • Introduction to Computer Networking
    www.PDHcenter.com PDH Course E175 www.PDHonline.org Introduction to Computer Networking Dale Callahan, Ph.D., P.E. MODULE 7: Fun Experiments 7.1 Introduction This chapter will introduce you to some networking experiments that will help you improve your understanding and concepts of networks. (The experiments assume you are using Windows, but Apple, Unix, and Linux systems will have similar commands.) These experiments can be performed on any computer that has Internet connectivity. The commands can be used from the command line using the command prompt window. The commands that can be used are ping, tracert, netstat, nslookup, ipconfig, route, ARP etc. 7.2 PING PING is a network tool that is used on TCP/IP based networks. It stands for Packet INternet Groper. The idea is to verify if a network host is reachable from the site where the PING command issued. The ping command uses the ICMP to verify if the network connections are intact. When a PING command is issued, a packet of 64 bytes is sent to the destination computer. The packet is composed of 8 bytes of ICMP header and 56 bytes of data. The computer then waits for a reply from the destination computer. The source computer receives a reply if the connection between the two computers is good. Apart from testing the connection, it also gives the round trip time for a packet to return to the source computer and the amount of packet loss [19]. In order to run the PING command, go to Start ! Run and in the box type “cmd”.
    [Show full text]
  • Freebsd Command Reference
    FreeBSD command reference Command structure Each line you type at the Unix shell consists of a command optionally followed by some arguments , e.g. ls -l /etc/passwd | | | cmd arg1 arg2 Almost all commands are just programs in the filesystem, e.g. "ls" is actually /bin/ls. A few are built- in to the shell. All commands and filenames are case-sensitive. Unless told otherwise, the command will run in the "foreground" - that is, you won't be returned to the shell prompt until it has finished. You can press Ctrl + C to terminate it. Colour code command [args...] Command which shows information command [args...] Command which modifies your current session or system settings, but changes will be lost when you exit your shell or reboot command [args...] Command which permanently affects the state of your system Getting out of trouble ^C (Ctrl-C) Terminate the current command ^U (Ctrl-U) Clear to start of line reset Reset terminal settings. If in xterm, try Ctrl+Middle mouse button stty sane and select "Do Full Reset" exit Exit from the shell logout ESC :q! ENTER Quit from vi without saving Finding documentation man cmd Show manual page for command "cmd". If a page with the same man 5 cmd name exists in multiple sections, you can give the section number, man -a cmd or -a to show pages from all sections. man -k str Search for string"str" in the manual index man hier Description of directory structure cd /usr/share/doc; ls Browse system documentation and examples. Note especially cd /usr/share/examples; ls /usr/share/doc/en/books/handbook/index.html cd /usr/local/share/doc; ls Browse package documentation and examples cd /usr/local/share/examples On the web: www.freebsd.org Includes handbook, searchable mailing list archives System status Alt-F1 ..
    [Show full text]
  • GNU Findutils Finding Files Version 4.8.0, 7 January 2021
    GNU Findutils Finding files version 4.8.0, 7 January 2021 by David MacKenzie and James Youngman This manual documents version 4.8.0 of the GNU utilities for finding files that match certain criteria and performing various operations on them. Copyright c 1994{2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 Scope :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Overview ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 Finding Files ::::::::::::::::::::::::::::::::::::: 4 2.1 find Expressions ::::::::::::::::::::::::::::::::::::::::::::::: 4 2.2 Name :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 4 2.2.1 Base Name Patterns ::::::::::::::::::::::::::::::::::::::: 5 2.2.2 Full Name Patterns :::::::::::::::::::::::::::::::::::::::: 5 2.2.3 Fast Full Name Search ::::::::::::::::::::::::::::::::::::: 7 2.2.4 Shell Pattern Matching :::::::::::::::::::::::::::::::::::: 8 2.3 Links ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.3.1 Symbolic Links :::::::::::::::::::::::::::::::::::::::::::: 8 2.3.2 Hard Links ::::::::::::::::::::::::::::::::::::::::::::::: 10 2.4 Time
    [Show full text]
  • User's Guide: Automated Operations Network
    IBM Tivoli NetView for z/OS Version 6 Release 2 User's Guide: Automated Operations Network IBM SC27-2866-01 IBM Tivoli NetView for z/OS Version 6 Release 2 User's Guide: Automated Operations Network IBM SC27-2866-01 Note Before using this information and the product it supports, read the information in “Notices” on page 429. This edition applies to version 6, release 2 of IBM Tivoli NetView for z/OS (product number 5697-NV6) and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. This edition replaces SC27-2866-00. © Copyright IBM Corporation 1997, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures .................................... xi About this publication ............................. xv Intended audience ................................. xv Publications ................................... xv IBM Tivoli NetView for z/OS library .......................... xv Related publications ............................... xvii Accessing terminology online ............................ xvii Using NetView for z/OS online help ......................... xviii Accessing publications online ........................... xviii Ordering publications .............................. xviii Accessibility ................................... xix Service Management Connect ............................. xix Tivoli technical training ............................... xix Tivoli user groups ................................
    [Show full text]
  • LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands
    LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 2: Essential Commands Table
    [Show full text]
  • Package 'Netstat'
    Package ‘netstat’ January 23, 2020 Type Package Title Retrieve Network Statistics Including Available TCP Ports Version 0.1.1 Maintainer Steve Condylios <[email protected]> BugReports https://github.com/stevecondylios/netstat/issues URL https://github.com/stevecondylios/netstat Description R interface for the 'netstat' command line utility used to retrieve and parse commonly used network statistics, including available and in-use transmission control protocol (TCP) ports. Primers offering technical background information on the 'netstat' command line utility are available in the ``Linux System Administrator's Manual'' by Michael Kerrisk (2014) <http://man7.org/linux/man-pages/man8/netstat.8.html>, and on the Microsoft website (2017) <https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/netstat>. License MIT + file LICENSE Encoding UTF-8 LazyData true RoxygenNote 6.1.1 Imports utils Language en-US NeedsCompilation no Author Steve Condylios [aut, cre] (<https://orcid.org/0000-0003-0599-844X>) Repository CRAN Date/Publication 2020-01-23 17:30:05 UTC R topics documented: netstat-package . .2 free_port . .2 free_ports . .3 1 2 free_port parse_netstat . .3 ports_in_use . .4 unassigned_ports . .4 Index 6 netstat-package Retrieve Network Statistics Including Available TCP Ports Description Retrieve Network Statistics Including Available TCP Ports Details It has the goal of providing a convenient way of retrieving and parsing commonly used Transmission Control Protocol (TCP) port information provided via the ’netstat’
    [Show full text]
  • Pvlibprotect T1 Extunderscore Python Documentation
    PVLIB_Python Documentation Release 0.3.1+0.g73e1df1.dirty Sandia National Labs, Rob Andrews, University of Arizona, github contributors Apr 20, 2016 Contents 1 Citing pvlib-python 3 2 Contents 5 2.1 Package Overview............................................5 2.2 What’s New............................................... 12 2.3 Installation................................................ 18 2.4 Contributing............................................... 21 2.5 Time and time zones........................................... 22 2.6 Modules................................................. 33 2.7 Classes.................................................. 82 2.8 Comparison with PVLIB MATLAB................................... 90 2.9 Variables and Symbols.......................................... 91 3 Indices and tables 93 Python Module Index 95 i ii PVLIB_Python Documentation, Release 0.3.1+0.g73e1df1.dirty pvlib-python provides a set of documented functions for simulating the performance of photovoltaic energy systems. The toolbox was originally developed in MATLAB at Sandia National Laboratories and it implements many of the models and methods developed at the Labs. More information on Sandia Labs PV performance modeling programs can be found at https://pvpmc.sandia.gov/. The source code for pvlib-python is hosted on github. Please see the Installation page for installation help. For examples of how to use pvlib-python, please see Package Overview and our Jupyter Notebook tutorials. The doc- umentation assumes general familiarity with Python,
    [Show full text]