About This Document
Purpose
This document describes the commands of the E9000 MM910 management module (MM910) in terms of the syntax, parameters, and usage guidelines. Command examples are also provided to help you understand how to use the commands to perform configurations.
This document describes only the commands required for deploying and maintaining Huawei E9000 devices. It does not include the following commands:
- Commands used for manufacturing, assembling, and factory inspection.
- Advanced commands used for engineering implementation or fault locating. Inappropriate use of these commands may result in device faults or service interruption. If you require information about these commands, contact Huawei technical support.
Intended Audience
This document is intended for:
- Installation and commissioning engineers
- Field maintenance engineers
- Network monitoring engineers
- Network administrators
- System maintenance engineers
Symbol Conventions
The following table lists the symbols that may be found in this document.
Symbol |
Description |
---|---|
Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. |
|
Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury. |
|
Indicates a potentially hazardous situation which, if not avoided, could result in minor or moderate injury. |
|
Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results. NOTICE is used to address practices not related to personal injury. |
|
Calls attention to important information, best practices, and tips. NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration. |
Security Conventions
- Password configuration
For security purposes, enable password complexity check.
In addition, change the initial password upon the first login and periodically change the password.
- Encryption algorithms
The encryption algorithms include Data Encryption Standard (DES), Advanced Encryption Standard (AES), Secure Hash Algorithm-1 (SHA-1), SHA-2, and Message Digest Algorithm 5 (MD5). DES and AES are reversible. SHA-1, SHA-2, and MD5 are irreversible.
- Individual data
The product, services, and features may require or use individual data during service operation or troubleshooting. Hence, you are required to formulate privacy policies and to take effective measures to ensure that individual data is sufficiently protected according to relevant laws.