Chapter 8      Command Reference
Privilege Level 15 Commands
Example
This command displays the network route to the host otherhost with a packet 
time to live value of 2, a wait time of 5 seconds, and 50 byte packets:
# traceroute  m 20  w 10 cisco.com 50
traceroute to example.com (209.165.200.224), 20 hops max, 50 byte 
packets
 1  ex1.com (209.165.200.225)  0.981 ms  0.919 ms  0.926 ms
 2  ex2.com (209.165.200.254)  1.528 ms  0.747 ms 0.661 ms
 3  ex3.com (209.165.200.255)  0.887 ms  0.770 ms  0.744 ms
 4  ex4.com (209.165.201.0)  0.932 ms  0.789 ms  0.679 ms
 5  ex5.com (209.165.201.1)  1.066 ms  1.052 ms  0.983 ms
 6  ex6.com (209.165.201.30)  1.472 ms  1.247 ms  1.847 ms
 7  ex7.com(209.165.201.31)  1.738 ms  1.424 ms  1.658 ms
 8  ex8.com (209.165.202.128)  3.728 ms  2.429 ms  2.804 ms
 9  ex9.com (209.165.202.129)  6.283 ms  5.499 ms 3.285 ms
10  ex10.com (209.165.202.158)  9.926 ms  73.463 ms  3.895 ms
11  ex11.com (209.165.202.159)  70.967 ms *  47.106 ms
Related Command
ping, page 8 5
Related Topics
Checking Command Syntax, page 8 2
System Help, page 8 3
Command Description Conventions, page 8 3
Privilege Level 15 Commands, page 8 10
Maintenance Image Commands, page 8 56
Privilege Level 15 Commands
This section describes the privilege level 15 commands. Only users with privilege 
level 15 can run them.
auth
Use the auth command to enable secure remote authentication:
User Guide for the CiscoWorks Hosting Solution Engine 1.8.1
8 10
OL 6319 01






footer




 

 

 

 

 Home | About Us | Network | Services | Support | FAQ | Control Panel | Order Online | Sitemap | Contact

cheap web hosting provider

 

Our partners: PHP: Hypertext Preprocessor Best Web Hosting Java Web Hosting Jsp Web Hosting Cheapest Web Hosting

Visionwebhosting.net Business web hosting division of Web Design Plus. All rights reserved