FINAL DRAFT - CISCO CONFIDENTIAL
6-5
CiscoONS 15216 EDFA2 Operations Guide
78-16033-01
Chapter6 ASH Commands
Summary of Security Permissions for ASH Comman ds
snmp tree attribute list Lists the attributes in the MIB.
See snmp tree attribute list Command, page
6-25.
No Yes Yes
snmp tree mib list Lists the MIBs in the MIB tree. No Yes Yes
snmp tree oid display Displays object identifier (OID) for a MIB tree
object.
No Yes Yes
snmp tree syntax display Displays the syntax of a MIB tree object. No Yes Yes
snmp tree table provided
list
Lists provided tables in the MIB tree. No Yes Yes
srom cfg boot display Displays the serial ROM boot content.
See srom cfg boot display Command, page 6-6.
No Yes Yes
srom cfg boot modify Modifies the serial ROM boot contents.
See srom cfg boot modify Command, page 6-7.
No Yes Yes
srom cfg debug display Displays one config (CFG) ROM byte. No No Yes
srom cfg debug modify Modifies one CFG ROM byte. No No Yes
srom cfg display Displays CFG ROM contents. No Yes Yes
srom cfg ip display Displays the serial ROM IP contents.
See srom cfg ip display Command, page 6-7.
No Yes Yes
srom cfg ip modify Modifies the serial ROM IP contents.
See srom cfg ip modify Command, page 6-8
No Yes Yes
srom cfg modify Modifies CFG ROM contents. No Yes Yes
srom id display Displays serial ROM contents. No Yes Yes
tl1c TL1s to host. Yes Yes Yes
user active list Lists the active users.
See user active list Command, page 6-29.
No Yes Yes
user active message send Sends the message to all active users.
See user active message send Command, page
6-29.
No Yes Yes
user entry create Creates a new user.
See user entry create Command, page 6-26.
No No Yes
user entry delete Deletes the user.
See user entry delete Command, page 6-27.
No No Yes
user entry edit Edits an existing user entry.
See user entry edit Command, page 6-26.
No No Yes
user file display Displays the user names and information.
See user file display and user name display
Commands, page 6-27.
No Yes Yes
user inactivity display Displays user inactivity times.
See user inactivity modify and user inactivity
display Commands, page 6-28.
Yes Yes Ye s
Table6-1 ASH Commands Security Permissions (Access Levels) (continued)
Command Description
User Access Levels
RRWRWA