No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Fat AP and Cloud AP V200R008C00 CLI-based Configuration Guide

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Local File Management

Local File Management

Context

When downloading files to the device or performing other operations on the device, ensure that the power supply of the device is workig properly; otherwise, the downloaded file or the file system may be damaged. As a result, the storage medium on the device may be damaged or the device cannot be properly started.

Logging In to the Device to Manage Files

Pre-configuration Tasks

Users can log in to the device through the console port, Telnet, or STelnet to manage storage devices, directories, and files. This login mode is mandatory for storage device management.

Before logging in to the device to manage files, complete the following tasks:

  • Ensure that routes are reachable between the terminal and the device.
  • Ensure that a user have logged in to the device using a terminal.
Configuration Process

After a user logs in to the device on a terminal, the user can perform operations on storage devices, directories, and files.

Users can perform the following operations in any sequence.

Procedure

  • Perform operations on directories.

    Table 3-38  Performing operations on directories
    Operation Command Description

    Display the current directory.

    pwd -

    Change the current directory.

    cd directory -

    Display files and subdirectories in a specified directory.

    dir [ /all ] [ filename | directory ] -

    Create a directory.

    mkdir directory -

    Delete a directory.

    rmdir directory
    • The directory to be deleted must be empty.

    • A deleted directory and its files cannot be restored from the recycle bin.

  • Perform operations on files.

    Table 3-39  Performing operations on files
    Operation Command Description

    Display the file content.

    more [ /binary ] filename [ offset ] [ all ] -

    Copy a file.

    copy source-filename destination-filename
    • Before copying a file, ensure that the storage space is sufficient for the file.
    • If the destination file has the same name as an existing file, the system prompts you whether to overwrite the existing file.

    Move a file.

    move source-filename destination-filename

    If the destination file has the same name as an existing file, the system prompts you whether to overwrite the existing file.

    Rename a file.

    rename old-name new-name -

    Compress a file.

    zip source-filename destination-filename -

    Decompress a file.

    unzip source-filename destination-filename -

    Delete a file.

    delete [ /unreserved ] [ /force ] { filename | devicename }

    This command cannot delete a directory.

    NOTICE:

    In this command, /unreserved indicates that the file cannot be restored.

    Restore a file.

    undelete { filename | devicename }

    If you run delete command without the /unreserved keyword, the file is moved to the recycle bin. You can run this command to restore the files in the recycle bin.

    Remove a file from the recycle bin.

    reset recycle-bin [ filename | devicename ]

    To delete a file permanently, remove the file from the recycle bin.

    Enter the system view.

    system-view

    To perform multiple operations at one time, run the execute batch-filename command in the system view. The batch file must be stored in the storage device first.

    Execute a batch file.

    execute batch-filename

  • Perform operations on storage devices.

    NOTE:

    Only the AD9431DN-24X, AD9430DN-24 and AD9430DN-12 support this configuration.

    When the file system fault cannot be rectified or the data on the storage device is unnecessary, you can format the storage device.

    When a storage device is formatted, data on the storage device is cleared and cannot be restored. Therefore, you must format a storage device with caution.

    Table 3-40  Performing operations on storage devices
    Operation Command Description

    Upload a USB flash drive.

    mount drive

    After being installed on the device, the storage device is automatically uploaded to the device. Therefore, you do not need to run this command to upload the storage device. If you run the umount command to unload the storage device and the storage device is not removed from the device, run the mount command to upload the storage device again.

    Unload the USB flash drive.

    umount drive

    Run this command to unload the storage device before you remove the storage device from the device. Otherwise, the storage device may be damaged.

    Format a storage device.

    format drive

    If the storage device is still unavailable after it is formatted, a physical exception occurs.

  • Configure the notification mode of the file system.

    When a user performs operations that may cause data loss or damage on a device, the system generates notifications or alarms. Users can configure the notification mode of the file system.

    Table 3-41  Configuring the notification mode of the file system
    Operation Command Description
    Enter the system view. system-view -
    Configure the notification mode of the file system. file prompt { alert | quiet }

    The default notification mode is alert.

    NOTICE:

    If the notification mode is set to quiet, the system does not provide notifications when data is lost because of user misoperations such as deleting files. Therefore, this notification mode must be used with caution.

Managing Files When the Device Functions as an FTP Server

Pre-configuration Tasks

Before connecting to the FTP server to manage files, complete the following tasks:

  • Ensure that routes are reachable between the terminal and the device.
  • Ensure that the terminal functions as the FTP client.
Configuration Process
NOTE:

The FTP protocol will bring risk to device security. The SFTP V2 mode is recommended.

Table 3-42 describes the procedure for managing files when the device functions as an FTP server.

Table 3-42  Managing files when the device functions as an FTP server
No. Task Description Remarks
1 Set FTP server parameters Configure FTP server parameters including the port number, source address, and timeout duration. The three steps can be performed in any sequence.
2 Configure local FTP user information Configure local FTP user information including the service type, user level, and authorized directory.
3 (Optional) Configure the FTP ACL Configure the ACL rule and FTP basic ACL, improving FTP access security.
4 Connect to the device using FTP Connect to the device using FTP on the terminal. -
Default Parameter Settings
Table 3-43  Default parameter settings
Parameter Default Value
FTP server function Disabled
Listening port number 21
FTP user

No local user is created

Procedure

  • Set FTP server parameters.

    Table 3-44  Setting FTP server parameters
    Operation Command Description

    Enter the system view.

    system-view -

    (Optional) Specify a port number for the FTP server.

    ftp server port port-number

    The default port number is 21.

    If a new port number is configured, the FTP server disconnects from all FTP clients and uses the new port number to listen to connection requests. Attackers do not know the port number and cannot access the listening port of the FTP server.

    Enable the FTP server function.

    ftp server enable

    By default, the FTP server function is disabled.

    (Optional) Configure the source address of the FTP server.

    ftp server-source { -a source-ip-address | -i interface-type interface-number }

    After the source address of the FTP server is configured, incoming and outgoing packets are filtered, ensuring the device security.

    After the source address of the FTP server is configured, you must enter the source address to log in to the FTP server.

    (Optional) Configure the timeout duration of the FTP server.

    ftp timeout minutes

    By default, the idle timeout duration is 30 minutes.

    During the timeout duration, if no operation is performed on the FTP server, the FTP client disconnects from the FTP server automatically.

    (Optional) Specify physical interfaces on the FTP server to which clients can connect.

    ftp server permit interface { interface-type interface-number } &<1-5>

    By default, clients can connect to all the physical interfaces on the FTP server.

    NOTE:
    • If the FTP service is enabled, the port number of the FTP service cannot be changed. To change the port number, run the undo ftp server command to disable the FTP service first.

    • After operations on files are complete, run the undo ftp server to disable the FTP server function to ensure the device security.

  • Configure local FTP user information.

    Before performing operations on files using FTP, configure the local user name and password, service type, and authorized directory on the FTP server.

    Table 3-45  Configuring local FTP user information
    Operation Command Description

    Enter the system view.

    system-view -

    Enter the AAA view.

    aaa -

    Configure the local user name and password.

    local-user user-name password irreversible-cipher password

    By default, no local user exists in the system and anonymous FTP access is not supported.

    -

    Configure the local user level.

    local-user user-name privilege level level
    NOTE:

    The user level must be set to 3 or upper levels to ensure successful connection establishment.

    Configure the service type for local users.

    local-user user-name service-type ftp

    By default, a local user can use any access type.

    Configure authorized directory.

    local-user user-name ftp-directory directory

    By default, the FTP directory of a local user is empty.

    When multiple FTP users use the same authorized directory, you can use the set default ftp-directory directory command to configure a default directory for these FTP users. In this case, you do not need run the local-user user-name ftp-directory directory command to configure an authorized directory for each user.

  • (Optional) Configure the FTP ACL.

    An ACL is composed of a list of rules such as the source address, destination address, and port number of packets. ACL rules are used to classify packets. After these rules are applied to routing devices, the routing devices determine the packets to be received and rejected.

    Users can configure a basic ACL to allow only specified clients to connect to the FTP server.

    NOTE:
    The ACL rules are as follows:
    • Other devices that match the ACL rule can establish an FTP connection with the local device only when permit is used in the ACL rule.

    • When deny is used in the ACL rule, other devices that match the ACL rule cannot establish FTP connections with the local device.

    • When the ACL rule is configured but packets from other devices do not match the rule, other devices cannot establish FTP connections with the local device.

    • When the ACL contains no rule, any other devices can establish FTP connections with the local device.

    Table 3-46  (Optional) Configuring the FTP ACL
    Operation Command Description

    Enter the system view.

    system-view -

    Enter the ACL view.

    acl [ number ] acl-number

    NOTE:

    FTP supports only basic ACLs (2000-2999).

    Configure the ACL rule.

    rule [ rule-id ] { deny | permit } [ source { source-address source-wildcard | any } | fragment | time-range time-name ] * -

    Return to the system view.

    quit -

    Configure basic FTP ACLs.

    ftp acl acl-number -

  • Connect to the device using FTP.

    Users can use the Windows CLI or third-party software to connect to the device from a terminal using FTP. The following describes how to connect to the device using the Windows CLI:

    • Run the ftp ip-address command to connect to the device using FTP.

      In the preceding command, ip-address indicates the IP address configured on the device. Routes between the terminal and the device are reachable.

    • Enter the user name and password as prompted and press Enter. If command prompt ftp> is displayed in the FTP client view, the user accesses the working directory on the FTP server. (The following information is only for reference.)

    C:\Documents and Settings\Administrator> ftp 192.168.150.208
    Connected to 192.168.150.208.
    220 FTP service ready.
    User(192.168.150.208:(none)):huawei
    331 Password required for huawei.
    Password:
    230 User logged in.
    ftp>

  • Run FTP commands to perform file-related operations.

    After connecting to the FTP server, users can run FTP commands to perform file-related operations including performing operations on directories and files, configuring the file transfer mode, and viewing the online help about FTP commands.

    NOTE:

    User rights are configured on the FTP server.

    Users can perform the following operations in any sequence.

    Table 3-47  Running FTP commands to perform file-related operations
    Operation Command Description
    Change the working directory on the server. cd remote-directory -
    Change the current working directory to its parent directory. cdup -
    Display the working directory on the server. pwd -
    Display or change the local working directory. lcd [ local-directory ]

    The lcd command displays the local working directory on the client, and the pwd command displays the working directory on the remote server.

    Create a directory on the server. mkdir remote-directory

    The directory name can consist of letters and digits. The following special characters are forbidden: < > ? \ :

    Delete a directory from the server. rmdir remote-directory -
    Display information about the specified directory or file on the server. dir/ls [ remote-filename [ local-filename ] ]
    • The ls command displays only the directory or file name, and the dir command displays detailed directory or file information such as size and date when the directory or file is created.
    • If no directory is specified in the command, the system searches for the file in user's authorized directories.
    Delete a file from the server. delete remote-filename -

    Upload a file.

    put local-filename [ remote-filename ]

    -

    Download a file.

    get remote-filename [ local-filename ]

    -

    Configure the file transfer mode is ASCII. ascii

    Either operation is feasible.

    • The default file transfer mode is ASCII.

    • The ASCII mode is used to transfer text files, and the binary mode is used to transfer programs, system software(such as files with name extension .cc, .bin, and .pat.), and database files.

    Configure the file transfer mode is Binary. binary
    Configure the data transmission mode is passive. passive

    Either operation is feasible.

    The default data transmission mode is active.

    Configure the data transmission mode is active. undo passive
    View the online help about FTP commands. remotehelp [ command ] -
    Enable the verbose function. verbose

    After the verbose function is enabled, all FTP response messages are displayed on the FTP client.

  • (Optional) Change the login user.

    The current user can switch to another user in the FTP client view. The new FTP connection is the same as that established by running the ftp command.

    Operation Command Description

    Change the current user in the FTP client view.

    user user-name [ password ]

    When the login user is switched to another user, the original user is disconnected from the FTP server.

  • Disconnect the FTP client from the FTP server.

    Users can run different commands in the FTP client view to disconnect the FTP client from the FTP server.

    Operation Command Description

    Disconnect the FTP client from the FTP server and return to the user view.

    bye or quit Either operation is feasible.

    Disconnect the FTP client from the FTP server and display the FTP client view.

    close or disconnect

Checking the Configurations
  • Run the display ftp-server command to check the FTP server configuration and status.

  • Run the display ftp-users command to view information about the FTP users that log in to the FTP server.

Managing Files When the Device Functions as an SFTP Server

Pre-configuration Tasks

SFTP allows a terminal to connect to the remote device using SSH and ensures the security of data transfer during the system upgrading and log downloading processes.

Before connecting to the SFTP server to manage files, complete the following tasks:

  • Ensure that routes are reachable between the terminal and the device.
  • Install the SSH client software on the terminal.
Configuration Process
NOTE:

The SFTP V1 protocol will bring risk to device security. The SFTP V2 mode is recommended.

Table 3-48 describes the procedure for managing files when the device functions as an SFTP server.

Table 3-48  Managing files when the device functions as an SFTP server
No. Task Description Remarks
1 Set SFTP server parameters Generate local key pair, enable the SFTP server, and configure SFTP server parameters, including the listening port number, key pair updating time, SSH authentication timeout duration, and number of SSH authentication retries. The three steps can be performed in any sequence.
2 Configuring the VTY user interface for SSH users to log in to the device Configure the user authentication mode, SSH supporting, and other basic attributes on the VTY user interface.
3 Configure SSH user information Configure SSH user information including the SSH user creation, authentication mode.
4 Connect to the device using SFTP Connect to the device using the SSH client software on the terminal. -
Default Parameter Settings
Table 3-49  Default parameter settings
Parameter Default Value

SFTP server function

Disabled

Listening port number

22

Time for updating the key pair of the server

0, indicating the key pair of the server is never updated

SSH authentication timeout duration

60 seconds

Number of SSH authentication retries

3

SSH user

SSH user is created

Procedure

  • Set SFTP server parameters.

    Table 3-50  Setting SFTP server parameters
    Operation Command Description

    Enter the system view.

    system-view

    -

    Generate a local key pair.

    rsa local-key-pair create, ecc local-key-pair create

    Run the display rsa local-key-pair public, display ecc local-key-pair public command to view the public key in the local RSA or ECC key pair. Configure the public key on the SSH server.

    NOTE:

    There are security risks if the configured local key pair length is smaller than 1024 bits. You are advised to use the local key pair with the default length 2048 bits.

    Enable the SFTP server function.

    sftp server enable

    By default, the SFTP server function is disabled.

    (Optional) Set the encryption algorithm list for the SSH server.

    ssh server secure-algorithms cipher { 3des | aes128 | aes128_ctr | aes256_cbc | aes256_ctr } *

    By default, an SSH server supports two encryption algorithms: AES128_CTR and AES256_CTR.

    An SSH server and a client need to negotiate an encryption algorithm for the packets exchanged between them. You can run the ssh server secure-algorithms cipher command to configure an encryption algorithm list for the SSH server. After the list is configured, the server matches the encryption algorithm list of a client against the local list after receiving a packet from the client and selects the first encryption algorithm that matches the local list. If no encryption algorithms in the list of the client match the local list, the negotiation fails.

    NOTE:

    Do not add 3des to the list because they provide the lowest security among the supported encryption algorithms.

    (Optional) Set the HMAC algorithm list for the SSH server.

    ssh server secure-algorithms hmac { md5 | md5_96 | sha1 | sha1_96 | sha2_256 | sha2_256_96 } *

    By default, an SSH server supports the SHA2_256 HMAC algorithm.

    An SSH server and a client need to negotiate an HMAC algorithm for the packets exchanged between them. You can run the ssh server secure-algorithms hmac command to configure an HMAC algorithm list for the SSH server. After the list is configured, the server matches the HMAC algorithm list of a client against the local list after receiving a packet from the client and selects the first HMAC algorithm that matches the local list. If no HMAC algorithms in the list of the client match the local list, the negotiation fails.

    NOTE:

    Do not add md5, sha1, md5_96, sha1_96, or sha2_256_96 to the HMAC algorithm list because they provide the lowest security among the supported HMAC algorithms.

    (Optional) Set the key exchange algorithm list for the SSH server.

    ssh server key-exchange { dh_group_exchange_sha1 | dh_group14_sha1 | dh_group1_sha1 } *

    By default, an SSH server supports the Diffie-hellman-group14-sha1 algorithm.

    The client and server negotiate the key exchange algorithm used for packet transmission. You can run the ssh server key-exchange command to configure a key exchange algorithm list on the SSH server. The SSH server compares the configured key exchange algorithm list with the counterpart sent by the client and then selects the first matched key exchange algorithm for packet transmission. If the key exchange algorithm list sent by the client does not match any algorithm in the key exchange algorithm list configured on the server, the negotiation fails.

    NOTE:
    The security levels of key exchange algorithms are as follows, from high to low: dh_group_exchange_sha1, dh_group14_sha1, and dh_group1_sha1. The dh_group_exchange_sha1 algorithm is recommended.

    (Optional) Configure the listening port number.

    ssh server port port-number

    By default, the listening port number is 22.

    If a new port number is configured, the SSH server disconnects from all SSH clients and uses the new port number to listen to connection requests. Attackers do not know the port number and cannot access the listening port of the SSH server.

    (Optional) Configure the time for updating the key pair of the server.

    ssh server rekey-interval hours

    By default, the time for updating the key pair is 0. The value 0 indicates that the key pair is never updated.

    When the specified time is up, the key pair of the SSH server is updated, ensuring the server security.

    (Optional) Configure the SSH authentication timeout duration.

    ssh server timeout seconds

    By default, the SSH authentication timeout duration is 60 seconds.

    (Optional) Configure the number of SSH authentication retries.

    ssh server authentication-retries times

    By default, the number of SSH authentication retries is 3.

    (Optional) Enable earlier versions to be compatible.

    ssh server compatible-ssh1x enable

    By default, the server's compatibility with earlier versions is disabled.

    (Optional) Specify physical interfaces on the SSH server to which clients can connect.

    ssh server permit interface { interface-type interface-number } &<1-5>

    By default, clients can connect to all the physical interfaces on the SSH server.

    NOTE:

    When the local RSA key pair is generated, two key pairs (a server key pair and a host key pair) are generated at the same time. Each key pair contains a public key and a private key. The length of the two key pairs ranges from 512 bits to 2048 bits.

    When the local ECC key pair is generated, only the host key pair is generated. The length of the host key pair can be 256, 384, or 521 bits. The default length is 521 bits.

  • Configuring the VTY user interface for SSH users to log in to the device.

    SSH users use the VTY user interface to log in to the device using SFTP. Attributes of the VTY user interface must be configured.

    Table 3-51  Configuring the VTY user interface for SSH users to log in to the device
    Operation Command Description

    Enter the system view.

    system-view -

    Enter the VTY user interface view.

    user-interface vty first-ui-number [ last-ui-number ] -

    Set the authentication mode of the VTY user interface to AAA.

    authentication-mode aaa

    By default, password authentication is used for console port login and aaa authentication is used for login on the VTY user interface.

    The authentication mode of the VTY user interface must be set to AAA. Otherwise, the protocol inbound ssh configuration fails and users cannot log in to the device.

    Configure a VTY user interface that supports SSH.

    protocol inbound ssh

    By default, the VTY user interface supports Telnet.

    If no VTY user interface supports SSH, users cannot log in to the device.

    Configure the user level.

    user privilege level level

    The user level must be set to 3 or upper levels to ensure successful connection establishment.

    If a local user uses password authentication, you can use the local-user user-name privilege level level command to set the level of the user to 3 or higher.

    (Optional) Configure other attributes of the VTY user interface.

    -
    Other attributes of the VTY user interface are as follows:
    • Maximum number of VTY user interfaces
    • Restrictions on incoming calls and outgoing calls on the VTY user interface
    • Terminal attributes on the VTY user interface
    For details, see Configuring the VTY User Interface.

  • Configure SSH user information.

    Configure SSH user information including the authentication mode. Authentication modes including RSA, password, password-rsa, ECC, password-ecc and all are supported.
    • The password-rsa authentication mode consists of the password and RSA authentication modes.
    • The all authentication mode indicates that SSH users only need to authenticated by password, or RSA.
    • The password-ecc authentication mode consists of the password and ECC authentication modes.
    • The all authentication mode indicates that SSH users only need to authenticated by ECC, password, or RSA.
    NOTE:
    If the SSH user uses the password authentication mode, only the SSH server needs to generate the RSA key. If the SSH user uses the RSA authentication mode, both the SSH server and client need to generate the RSA key and save and configure the public key of the peer end locally.
    Table 3-52  Configuring SSH user information
    Operation Command Description

    Enter the system view.

    system-view

    -

    Enter the AAA view.

    aaa

    -

    Create SSH users.

    local-user user-name password irreversible-cipher password

    -

    Configure the SSH user level.

    local-user user-name privilege level level

    The local user level must be set to 3 or upper levels. This operation cannot be performed if the user level in the VTY interface view has been set to 3 or higher using the user privilege level level command.

    Configure the service type for SSH users.

    local-user user-name service-type ssh

    -

    Configure the authorized directory for SSH users.

    local-user user-name ftp-directory directory

    By default, the authorized directory for an SSH user is the root directory of the default storage device.

    Return to the system view.

    quit

    -

    Configure the authentication mode for SSH users.

    ssh user user-name authentication-type { password | rsa | password-rsa | ecc | password-ecc | all }

    -
    If any one of the following authentication modes is configured for SSH users:
    • rsa
    • password-rsa
    • ecc
    • password-ecc

    Enter the RSA public key view.

    rsa peer-public-key key-name [ encoding-type { der | openssh | pem } ]

    -

    Enter the ECC public key view.

    ecc peer-public-key key-name encoding-type { der | openssh | pem }

    -

    Enter the public key editing view.

    public-key-code begin

    -

    Edit the public key.

    hex-data

    • The public key must be a hexadecimal character string in the public key format generated by the SSH client software. For details, see SSH client software help.
    • Copy and paste the RSA public key to the device that functions as the SSH server.

    Quit the public key editing view.

    public-key-code end

    -

    Return to the system view.

    peer-public-key end

    -

    Assign an RSA public key to an SSH user.

    ssh user user-name assign { rsa-key | ecc-key } key-name

    -

  • Connect to the device using SFTP.

    The SSH client software supporting SFTP must be installed on the terminal to ensure that the terminal can connect to the device using SFTP to manage files. The following describes how to connect to the device using the OpenSSH and the Windows CLI.

    NOTE:
    • For details how to install the OpenSSH, see the OpenSSH installation description.

    • To use the OpenSSH to connect to the device using SFTP, run the OpenSSH commands. For details about OpenSSH commands, see OpenSSH help.

    • Windows command prompt can identify commands supported by the OpenSSH only when the OpenSSH is installed on the terminal.

    Access the Windows CLI and run the commands supported by the OpenSSH to connect to the device using SFTP to manage files.

    If command prompt sftp> is displayed in the SFTP client view, the user accesses the working directory on the SFTP server. (The following information is only for reference.)

    C:\Documents and Settings\Administrator> sftp sftpuser@10.136.23.5
    Connecting to 10.136.23.5...
    The authenticity of host '10.136.23.5 (10.136.23.5)' can't be established.
    RSA key fingerprint is 46:b2:8a:52:88:42:41:d4:af:8f:4a:41:d9:b8:4f:ee.
    Are you sure you want to continue connecting (yes/no)? yes
    Warning: Permanently added '10.136.23.5' (RSA) to the list of known hosts.
    
    User Authentication
    Password:
    sftp>

  • Run SFTP commands to perform file-related operations.

    In the SFTP client view, you can perform one or more file-related operations listed in Table 3-53 in any sequence.

    NOTE:

    In the SFTP client view, the system does not support predictive command input. Therefore, you must type commands in full name.

    Table 3-53  Running SFTP commands to perform file-related operations
    Operation Command Description
    Change the user's current working directory. cd [ remote-directory ] -
    Change the current working directory to its parent directory. cdup -
    Display the user's current working directory. pwd -
    Display the file list in a specified directory. dir/ls [ -l | -a ] [ remote-directory ] Outputs of the dir and ls commands are the same.
    Delete directories from the server. rmdir remote-directory &<1-10>

    A maximum of 10 directories can be deleted at one time.

    Before running the rmdir command to delete directories, ensure that the directories do not contain any files. Otherwise, the deletion fails.

    Create a directory on the server. mkdir remote-directory -
    Change the name of a specified file on the server. rename old-name new-name -
    Download a file from the remote server. get remote-filename [ local-filename ] -
    Upload a local file to the remote server. put local-filename [ remote-filename ] -
    Delete files from the server.

    remove remote-filename &<1-10>

    A maximum of 10 files can be deleted at one time.

    View the help about SFTP commands. help [ all | command-name ] -

  • Disconnect the SFTP client from the SSH server.

    Operation Command Description
    Disconnect the SFTP client from the SSH server. quit -

Checking the Configurations
  • Run the display ssh user-information [ username ] command to view SSH user information on the SSH server.

  • Run the display ssh server status command to view the global configuration of the SSH server.

  • Run the display ssh server session command to view the session information of the SSH client on the SSH server.

Translation
Download
Updated: 2019-01-11

Document ID: EDOC1000176006

Views: 115011

Downloads: 309

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next