Chapter 8 Command Reference
Privilege Level 15 Commands
Example
This command displays the network route to the host otherhost with a packet
time to live value of 2, a wait time of 5 seconds, and 50 byte packets:
# traceroute m 20 w 10 cisco.com 50
traceroute to example.com (209.165.200.224), 20 hops max, 50 byte
packets
1 ex1.com (209.165.200.225) 0.981 ms 0.919 ms 0.926 ms
2 ex2.com (209.165.200.254) 1.528 ms 0.747 ms 0.661 ms
3 ex3.com (209.165.200.255) 0.887 ms 0.770 ms 0.744 ms
4 ex4.com (209.165.201.0) 0.932 ms 0.789 ms 0.679 ms
5 ex5.com (209.165.201.1) 1.066 ms 1.052 ms 0.983 ms
6 ex6.com (209.165.201.30) 1.472 ms 1.247 ms 1.847 ms
7 ex7.com(209.165.201.31) 1.738 ms 1.424 ms 1.658 ms
8 ex8.com (209.165.202.128) 3.728 ms 2.429 ms 2.804 ms
9 ex9.com (209.165.202.129) 6.283 ms 5.499 ms 3.285 ms
10 ex10.com (209.165.202.158) 9.926 ms 73.463 ms 3.895 ms
11 ex11.com (209.165.202.159) 70.967 ms * 47.106 ms
Related Command
ping, page 8 5
Related Topics
Checking Command Syntax, page 8 2
System Help, page 8 3
Command Description Conventions, page 8 3
Privilege Level 15 Commands, page 8 10
Maintenance Image Commands, page 8 56
Privilege Level 15 Commands
This section describes the privilege level 15 commands. Only users with privilege
level 15 can run them.
auth
Use the auth command to enable secure remote authentication:
User Guide for the CiscoWorks Hosting Solution Engine 1.8.1
8 10
OL 6319 01
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved