Cisco Systems not available manual Command set auth-string id device name

Page 4

Step 12 At the CAPF prompt, perform the following task, depending on what you want to accomplish:

If you plan to use the authentication string that the get phone-info command creates, go to Step 14.

If you want to generate an authentication string for a specific phone, issue the following

command: set auth-string id <device name>

Caution If you want to set the authentication string to Null or if you want to generate new authentication strings, enter the command, set auth-string <id all > <value> [<type>], at the CAPF prompt; press Enter. Cisco strongly recommends that you use null authentication only in closed, secure environments.

Step 13 At the next CAPF prompt, enter show auth-string all, press Enter.

The phone information from the database displays for each phone. If thousands of phones exist in the cluster, all phones may not display in the CLI. The CAPF utility logs the phone record information in C:\ProgramFiles\Cisco\CAPF\Trace\CAPF.csv. If you have access to software that converts CSV files, such as Microsoft Excel, you can convert the CAPF.csv file and view the records by using that software. The utility also writes the entries to the log file. To display a single device name and authentication string, issue the following

command: show auth-string id <device name>

Step 14 Determine the phone user that is associated with the Device Name by performing the following procedure:

a. On the server where you installed the CAPF utility, obtain the CSV file, CAPF.csv, from C:\Program Files\Cisco\CAPF\Trace.

b. By using software that converts CSV files, export this file to a format in which you can view the phone record information.

Page: 4

Image 4
Contents Partner Information Contact Information Product RequirementsSales contact Support Contact Operating System Version Patch-level Windows 2000 ServerProcedure Choose Start Programs CapfCommand set auth-string id device name Command show auth-string id device namePage Certification Checklist for 3rd Party Applications Known Issues