scli-0.4.0/0000777000175100017510000000000011337447642007467 500000000000000scli-0.4.0/doc/0000777000175100017510000000000011337447642010234 500000000000000scli-0.4.0/doc/gpl.texinfo0000644000175100017510000003604311337445530012330 00000000000000@setfilename gpl.info @unnumbered GNU GENERAL PUBLIC LICENSE @center Version 2, June 1991 @display Copyright @copyright{} 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. @end display @unnumberedsec Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software---to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. @iftex @unnumberedsec TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION @end iftex @ifinfo @center TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION @end ifinfo @enumerate @item This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The ``Program'', below, refers to any such program or work, and a ``work based on the Program'' means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term ``modification''.) Each licensee is addressed as ``you''. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. @item You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. @item You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: @enumerate a @item You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. @item You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. @item If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) @end enumerate These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. @item You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: @enumerate a @item Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, @item Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, @item Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) @end enumerate The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. @item You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. @item You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. @item Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. @item If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. @item If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. @item The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and ``any later version'', you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. @item If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. @iftex @heading NO WARRANTY @end iftex @ifinfo @center NO WARRANTY @end ifinfo @item BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM ``AS IS'' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. @item IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. @end enumerate @iftex @heading END OF TERMS AND CONDITIONS @end iftex @ifinfo @center END OF TERMS AND CONDITIONS @end ifinfo scli-0.4.0/doc/scli.info0000644000175100017510000024616111337446323011764 00000000000000This is scli.info, produced by makeinfo version 4.11 from scli.texinfo. INFO-DIR-SECTION Net Utilities: START-INFO-DIR-ENTRY * scli: (scli). SNMP Command Line Interface END-INFO-DIR-ENTRY This file documents the `scli' SNMP command line interface. Copyright (C) 2001-2004 Ju"rgen Scho"nwa"lder Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Foundation.  File: scli.info, Node: Top, Next: Instructions, Prev: (dir), Up: (dir) This file documents the `scli' SNMP command line interface. * Menu: * Instructions:: How to read this manual. * Copying:: The GNU General Public License. * Overview:: Overview, history and software design. * Modes and Commands:: SCLI modes and their commands. * Extending:: Extending SCLI with new modes and commands. * Problems:: Reporting bugs. * Concept Index:: Index of concepts.  File: scli.info, Node: Instructions, Next: Copying, Prev: Top, Up: Top 1 How to Read This Manual ************************* This document contains two parts. The first part explains the design and the history of the `scli' tool. The second part provides a description of the modes and commands provided by `scli'. The third part contains a step by step instructions how `scli' can be extended with new modes and commands  File: scli.info, Node: Copying, Next: Overview, Prev: Instructions, Up: Top GNU GENERAL PUBLIC LICENSE ************************** Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble ======== The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 1. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 2. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 3. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 4. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a. Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b. Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 5. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 6. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it. 7. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 8. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 9. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 10. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 11. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 12. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 13. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS  File: scli.info, Node: Overview, Next: Modes and Commands, Prev: Copying, Up: Top 2 Overview ********** The GNU `scli' program implements a network management program that provides a command line interface to browse, monitor, and configure network devices. It uses the Simple Network Management Protocol (SNMP) to communicate with the devices and supports several standardized and some proprietary Management Information Base (MIB) modules. Most SNMP management tools try to be very generic and they often fail to be useful. A good example are generic MIB browsers that display raw MIB data structures. These browsers tend to be of little use for actual management because MIB data structures are designed to be read and undertstood by programs rather than humans and thus difficult to deal with. Furthermore, the SNMP way of accessing MIB data is often simplistic and not optimized for humans. For example, humans usually prefer to refer to access objects via names rather than numbers while a machine oriented protocol such as SNMP generally prefers numbers over names. The SNMP command line interface (`scli') was designed to be specific rather than generic. In particular, `scli' understands the data it manipulates and it presents data in a way which is optimized for a human interface. It is not uncommon that `scli' uses information from different MIB modules in order to display data in a format which is easy to understand for human beings. 2.1 History =========== The `scli' package was written because of continued frustration how complex it is to configure and troubleshoot SNMP manageable devices with commonly used SNMP tools. The observation that better tools are needed to support SNMP management is nothing new. The author tried several approaches to tackle this problem before. In the 1990's, work was done on scripting language API extensions to simplify the interaction with networked devices. The result of these efforts was the Tnm [] extension for Tcl [], which is widely deployed these days, especially for testing and device emulation purposes. In the 1990's, the author also experimented with concepts of network management platform, which resulted in `tkined', a kind of a light-weight management platform. The `tkined' platform provides generic services and is highly extensible. In order to extend `tkined' with new management functionalities, all you need to do is to write a Tcl script. Although this sounds nice in theory, the reality is that most people who were interested in `tkined' did not want to write management scripts. Although the package has been openly available for many years, only few script contributions went back into the source distribution. The author also wrote several generic MIB browsers. A very old one is still running on our Web server and being used regularly by people to browse MIBs and agents. But such Web-based solutions do not fit into into the preferred work style of the author. Firing up a complex Web browser just to retrieve and display a (potentially big) HTML page which shows management data at the abstraction level of an API between network elements in a distributed system just does not seem to be right and efficient. In recent years, the `scli' author was involved in the specification and implementation of MIBs for the delegation of management functions. Very early in the project, it became clear that we need to have a good front-end. Again, we tried several approaches. The first one was a Java based applet running in a Web browser. This was usable for demos, but nothing for everyday work. The second front-end was a Java stand-alone program. It provides a better user interface, but it eats up so many resources (and refuses to run on my 256 color display) so that people again used the old Web-based MIB browser which was written several years ago. The conclusion one can derive from all these observations is that the approach to build generic tools is fundamentally flawed. Instead, it is necessary to build very specific tools which understand the management data they manipulate and which generate output which is optimized for humans. Furthermore, many people accept command line interface as a natural human interface for interacting with network elements. 2.2 Project Design ================== It is time consuming to build specific tools rather than generic tools. Someone who understands specific MIBs must design easy to use human management interfaces on top of them. The only reasonable way to tackle this problem with limited resources is to start an open source project and to get lots of programmers involved. This leads to the requirement that the source code must be modular so that specific extensions for e.g. modem management can be easily integrated. The experience with past projects shows that the number of SNMP programmers is really not that huge. So this leads to another important requirement: It must be possible to invoke SNMP operations without any intimidate knowledge of the SNMP protocol and SNMP specific APIs. The technical mechanism to address this requirement is to use a MIB compiler which generates stub code for management applications from MIB modules. The stub code should export simple C structures that every programmer can easily understand and handle. 2.3 Software Architecture =========================  File: scli.info, Node: Modes and Commands, Next: Extending, Prev: Overview, Up: Top 3 Modes and Commands ******************** The following sections describe the `scli' modes together with their commands. 100 scli version 0.4.0 (c) 2001-2010 Juergen Schoenwaelder 3COM MODE The 3com scli mode allows to manipulate virtual lans (vlans) on 3com bridges. It is based on the PRODUCTMIB which is implemented at least on 3Com SuperStack II switches. `create 3com bridge vlan ' `delete 3com bridge vlan ' `set 3com bridge vlan name ' `set 3com bridge vlan ports ' `show 3com bridge vlan info []' `dump 3com bridge vlan' The `create 3com bridge vlan' command is used to create a new virtual LAN with the given and . The `delete 3com bridge vlan' command deletes all selected virtual LANs. The regular expression is matched against the virtual LAN names to select the vlans that should be deleted. The `set 3com bridge vlan name' command changes the name of a virtual LAN. The `set 3com bridge vlan ports' command allows to assign ports to port-based virtual LANs. The regular expression is matched against the virtual LAN names to select the vlans that should be modified. The argument contains a comma separated list of port numbers or port number ranges, e.g. 1,5,7-8. The `show 3com bridge vlan info' command shows summary information about all selected virtual LANs. The optional regular expression is matched against the virtual LAN names to select the virtual LANs of interest. The command generates a table with the following columns: VLAN virtual LAN number STATUS status of the virutal LAN (see below) NAME name of the virutal LAN INTERFCE virtual LAN interface number PORTS ports assigned to the virtual LAN The status is encoded in two characters. The first character indicates the status of the row (A=active, S=not in service, R=not ready). The second character indicates virutal LAN type (P=port, I=IP-subnet, O=protocol, S=src address, D=dst address). The `dump 3com bridge vlan' command generates a sequence of scli commands which can be used to restore the virtual LAN configuration. 3.1 ATM MODE ============ The atm scli mode is based on the ATM-MIB as published in RFC 2515. This mode is intended to display and configure ATM parameters. `show atm interface info ' `show atm interface details ' The `show atm interface info' command displays summary information for all selected ATM interfaces. The optional regular expression is matched against the interface descriptions to select the interfaces of interest. The command generates a table with the following columns: INTERFACE network interface number DESCRIPTION description of the network interface The `show atm interface details' command describes the selected ATM interfaces in more detail. The optional regular expression is matched against the interface descriptions to select the interfaces of interest. 3.2 BRIDGE MODE =============== The scli bridge mode is based on the BRIDGE-MIB as published in RFC 4188 and the Q-BRIDGE-MIB as published in RFC 4363. It provides commands to browse information specific to IEEE 802.1 LAN bridges (also known as layer two switches). `show bridge info' `show bridge ports' `show bridge stp ports' `show bridge forwarding' `show bridge filter' `show bridge stats' `monitor bridge stats' `show bridge vlan info []' `show bridge vlan details []' `create bridge vlan ' `delete bridge vlan ' The `show bridge info' command displays summary information about a bridge, such as the number of ports and the supported bridging functions and associated parameters. The `show bridge ports' command displays information about the bridge ports. The `show bridge stp ports' command displays information about the bridge ports which participate in the spanning tree protocol. The command generates a table with the following columns: PORT port number PRIO spanning tree priority of the port STATE spanning tree status of the port P-COST path costs for this port D-ROOT designated root port D-COST designated costs D-BRIDGE designated bridge D-PORT designated port The status is encoded in two characters. The first character indicates whether STP on the port is enabled (E) or disabled (D). The second character indicates the current status (D=disabled, B=blocking, I=listening, L=learning, F=forwarding, X=broken). The `show bridge forwarding' command displays the forwarding data base used by transparent bridges. The command generates a table with the following columns: PORT port number STATUS status of the forwarding entry ADDRESS address associated with the port NAME name of the address (where known) VENDOR vendor info derived from the address The `show bridge filter' command shows filtering information. The `show bridge stats' command displays per port statistics for transparent bridges. The command generates a table with the following columns: PORT port number I-FPS input frames per second O-FPS output frames per second D-FPS discarded frames per second DESCRIPTION description of the port The `monitor bridge stats' command shows the same information as the show bridge stats command. The information is updated periodically. The `show bridge vlan info' command shows summary information about configured VLANs. The command generates a table with the following columns: VLAN VLAN number (between 1 and 4094) STATUS status of the VLAN NAME name of the VLAN PORTS ports assigned the the VLAN The `show bridge vlan details' command describes the selected VLANs in detail. The optional regular expression is matched against the VLAN names to select the VLANs of interest. The `create bridge vlan' command creates a new vlan with the given and name . The `delete bridge vlan' command deletes all vlans whose vlan name matches the regular expression . 3.3 CISCO MODE ============== The cisco scli mode is used to display and configure cisco parameters. It also supports retrieval of accounting data from devices that support the old cisco accounting mib. This mode is based on the OLD-CISCO-IP-MIB published in May 1994. `show cisco processes' `show cisco ip accounting info' `show cisco ip accounting current sorted' `show cisco ip accounting current raw' `show cisco ip accounting snapshot sorted' `show cisco ip accounting snapshot raw' `monitor cisco ip accounting current' `monitor cisco ip accounting snapshot sorted' `set cisco ip accounting checkpoint' `show cisco dot11 interface info' `show cisco dot11 clients stats' `monitor cisco dot11 clients stats' The `show cisco processes' command displays information about all processes running on a CISCO device. The command generates a table with the following columns: CPU processor executing a given process PID process indentification number on a CPU P priority of the process MEMORY memory used by the process TIME CPU time used by the process COMMAND command executed by the process The `show cisco ip accounting info' command displays general status information concerning the simple cisco IPv4 accounting mechanism supported by many older cisco devices. In particular, it displays the starting point of the current and snapshot data tables, information about the available accounting capacity, and statistics about lost bytes and packets. cisco IP current accounting data The `show cisco ip accounting current raw' command displays the raw accounting data retrieved from the current table. The command generates a table with the following columns: SOURCE source IPv4 address in dotted notation DESTINATION destination IPv4 address in dotted notation PACKETS packets sent from source to destination BYTES bytes sent from source to destination cisco IP snapshot accounting data The `show cisco ip accounting snapshot raw' command displays the raw accounting data retrieved from the snapshot table. The command generates a table with the following columns: SOURCE source IPv4 address in dotted notation DESTINATION destination IPv4 address in dotted notation PACKETS packets sent from source to destination BYTES bytes sent from source to destination cisco IP current accounting data cisco IP snapshot accounting data The `set cisco ip accounting checkpoint' command takes a snapshot of the current accounting table by copying it to the snapshot accounting table. The current accounting table is reinitialized before it is updated again. The command returns the serial number of the snapshot. The `show cisco dot11 interface info' command displays information about all IEEE 802.11 interfaces on a CISCO device. The command generates a table with the following columns: IFACE network interface number SPEED speed in bits per second NAME name of the network interface CLNT number of associated clients BRDG number of assiciated bridges RPRT number of assiciated repeaters ASSCI total number of associated stations ASSCO total number of deassociated stations ROAMI total number of roamed-in stations ROAMO total number of roamed-away stations AUTHI total number of authenticated stations AUTHO total number of deauthenticated stations The `show cisco dot11 clients stats' command displays information about all IEEE 802.11 clients associated with a CISCO device. The command generates a table with the following columns: IF network interface number SSID SSID to which client is associated ADDRESS client MAC address IPv4-ADDRESS client}s IPv4 address (if supplied) SGNL client}s signal strength UPTIME lifetime of client}s association I-BPS input bytes per second O-BPS output bytes per second ERR errors per second The `monitor cisco dot11 clients stats' command shows the same information as the show cisco dot11 clients stats command. The information is updated periodically. 3.4 DISMAN MODE =============== The scli disman mode is based on the DISMAN-SCRIPT-MIB as published in RFC 3165 and the DISMAN-SCHEDULE-MIB as published in RFC 3231. It allows to browse and configure distributed managers. `create disman script ' `create disman run ' `show disman languages' `show disman script info' `show disman script details' `show disman launch info' `show disman launch details' `show disman run info' `show disman run details' `show schedule info' `show schedule details' `create schedule ' `delete schedule ' `dump schedule' `monitor schedule info' `monitor disman run' ... ... languages supported by the distributed manager script summary information scripts installed at the distributed manager launch summary information launch buttons installed on the distributed manager summary information about running scripts running scripts on the distributed manager The `show schedule info' command displays summary information about the scheduled actions. schedules on the distributed manager ... ... The `dump schedule' command generates a sequence of scli commands which can be used to restore the schedule configuration. scheduler information monitor running scripts 3.5 ENTITY MODE =============== The entity scli mode is based on the ENTITY-MIB as published in RFC 2737. It provides commands to browse the physical entities or physical components that make up a managed system. `show entity info' `show entity details' `show entity containment' `show entity sensors' The `show entity info' command displays summary information about the physical entities that compose the system. The command generates a table with the following columns: ENTITY entity number CLASS class of the entity (see below) NAME name of the entity DESCRIPTION description of the entity The `show entity details' command describes the physical entities in more detail. The `show entity containment' command displays the physical entity containment hierarchy. The `show entity sensors' command describes the physical sensor entities in more detail. 3.6 ETHERNET MODE ================= The ethernet scli mode is based on the EtherLike-MIB as published in RFC 2665 and the MAU-MIB as published in RFC 2668. `show ethernet mau' `show ethernet stats' `show ethernet history' `monitor ethernet stats' The `show ethernet mau' command displays information about the medium attachment units (MAUs) for each ethernet port. The command generates a table which has the following columns: INTERFACE network interface number MAU medium attachment unit number per interface STATUS status of the medium attachment unit MEDIA media availability JABBER jabber state of the medium attachment unit AUTONEG autonegation capabilities TYPE type of the medium attachment unit The `show ethernet stats' command displays ethernet specific statistics for each ethernet interface. The command outputs a table which has the following columns: INTERFACE network interface number ALIGN alignement errors per second FCS frame check sequence errors per second RCV MAC receive errors per second LONG frames exceeding maximum frame size per second DEFER deferred transmission per second SCOL single collisions per second MCOLR multiple collisions per second XCOL excessive collisions per second LCOL late collisions per second XMIT MAC transmit errors per second CARR carrier sense errors per second ... The `monitor ethernet stats' command shows the same information as the show ethernet stats command. The information is updated periodically. 3.7 HP MODE =========== The hp scli mode is used to display and configure hp parameters. `show hp fault log' 3.8 XXX ======= 3.9 INTERFACE MODE ================== The scli interface mode is based on the IF-MIB as published in RFC 2863. It provides commands to browse, monitor and configure arbitrary network interfaces. `create interface stack ' `delete interface stack ' `set interface status ' `set interface alias ' `set interface notifications ' `set interface promiscuous ' `show interface info []' `show interface details []' `show interface stack []' `show interface stats []' `monitor interface stats []' `loop interface stats []' `check interface status []' `dump interface' The `set interface status' command modifies the administrative status of all selected interfaces. The regular expression is matched against the interface descriptions to select the interfaces of interest. The parameter must be one of the strings "up", "down", or "testing". The `set interface alias' command assigns the alias name to the selected interfaces. The alias name provies a non-volatile handle which can be used by management applications to better identify interfaces. The regular expression is matched against the interface descriptions to select the interfaces. The `set interface notifications' command controls whether the selected interfaces generate linkUp and linkDown notifications. The regular expression is matched against the interface descriptions to select the interfaces. The parameter must be one of the strings "enabled" or "disabled". The `set interface promiscuous' command controls whether the selected interfaces operate in promiscuous mode or not. The regular expression is matched against the interface descriptions to select the interfaces. The parameter must be one of the strings "true" or "false". The `show interface info' command displays summary information for all selected interfaces. The optional regular expression is matched against the interface descriptions to select the interfaces of interest. The command generates a table with the following columns: INTERFACE network interface number STATUS interface status (see below) MTU maximum transfer unit TYPE type of the network interface SPEED speed in bits per second NAME name of the network interface DESCRIPTION description of the network interface The status is encoded in four characters. The first character indicates the administrative status (U=up, D=down, T=testing). The second character indicates the operational status (U=up, D=down, T=testing, ?=unknown, O=dormant, N=not-present, L=lower-layer-down). The third character indicates whether a connector is present (C=connector, N=none) and the fourth character indicates whether the interface is in promiscuous mode (P=promiscuous, N=normal). The `show interface details' command describes the selected interfaces in detail. The optional regular expression is matched against the interface descriptions to select the interfaces of interest. The `show interface stack' command shows the stacking order of the interfaces. The command generates a table with the following columns: INTERFACE network interface number STACK indication of the stacking order TYPE type of the network interface DESCRIPTION description of the network interface The `show interface stats' command displays network interface statistics for all selected interfaces. The optional regular expression is matched against the interface description to select the interfaces. The command outputs a table which has the following columns: INTERFACE network interface number STATUS interface status (see above) I-BPS input bytes per second O-BPS output bytes per second I-PPS input packets per second O-PPS output packets per second I-ERR input errors per second O-ERR output errors per second I-DIS input packets discarded per second O-DIS output packets discarded per second I-UNK input packets with unknown protocols per second DESCRIPTION description of the network interface The `monitor interface stats' command shows the same information as the show interface stats command. The information is updated periodically. The `loop interface stats' command shows the same information as the show interface stats command. The information is updated periodically. The `check interface status' command checks the status of interfaces. The optional regular expression is matched against the interface description to select the interfaces In particular, the check interface status commands detects fault conditions if (a) ifAdminStatus is not down and ifOperStatus is down or (b) ifAdminStatus is down and ifOperStatus is not down and not notPresent The `dump interface' command generates a sequence of scli commands which can be used to restore the interface configuration. 3.10 IP MODE ============ The ip scli mode is based on the IP-MIB as published in RFC 2011, the IP-FORWARD-MIB as published in RFC 2096, the IP-TUNNEL-MIB as published in RFC 2667 and the RFC1213-MIB as published in RFC 1213. It provides commands to browse, monitor and configure IP protocol engines. `set ip forwarding ' `set ip ttl ' `show ip info' `show ip forwarding' `show ip addresses' `show ip tunnel' `show ip mapping' `dump ip' The `set ip forwarding' command controls whether the IP protocol engine forwards IP datagrams or not. The parameter must be one of the strings "enabled" or "disabled". The `set ip ttl' command can be used to change the default time to live (TTL) value used by the IP protocol engine. The parameter must be a number between 1 and 255 inclusive. The `show ip info' command displays parameters of the IP protocol engine, such as the default TTL or whether the node is forwarding IP packets. The `show ip forwarding' command displays the IP forwarding data base. The command generates a table with the following columns: DESTINATION destination address and prefix NEXT-HOP next hop towards the destination TOS type of service selector TYPE type (direct/indirect) of the entry PROTO protocol which created the entry INTERFACE interface used for forwarding The `show ip addresses' command displays the IP addresses assigned to network interfaces. The command generates a table with the following columns: ADDRESS IP address PREFIX IP address prefix length NAME name of the IP address INTERFACE network interface number DESCRIPTION description of the network interface The `show ip tunnel' command displays information about existing IP tunnels. The `show ip mapping' command displays the mapping of IP address to lower layer address (e.g., IEEE 802 addresses). The command generates a table with the following columns: INTERFACE network interface number STATUS status of the mapping entry ADDRESS IP address ADDRESS lower layer address The `dump ip' command generates a sequence of scli commands which can be used to restore the IP configuration. 3.11 ISDN MODE ============== The scli isdn mode is based on the ISDN-MIB as published in RFC 2127. `show isdn bri []' `show isdn bearer' `show isdn endpoints' The `show isdn bri' command shows information about the ISDN basic rate interfaces. The command outputs a table which has the following columns: INTERFACE network interface number TYPE type of the ISDN interface TOPOLOGY line topology MODE interface mode (te/nt) SIGNALING signaling mode (active/inactive) DESCRIPTION description of the network interface The `show isdn bearer' command shows information about the ISDN B (bearer) channels. The `show isdn endpoints' command shows information about the ISDN endpoints. 3.12 NETSNMP MODE ================= The netsnmp scli mode is used to display and configure netsnmp specific parameters. It is based on the UCD-SNMP-MIB. `set netsnmp debugging ' `set netsnmp restart' `show netsnmp info' `show netsnmp load' `show netsnmp exec' `show netsnmp proc' `dump netsnmp' The `set netsnmp debugging' command controls whether the agent generates debug messages or not. The parameter must be one of the strings "enabled" or "disabled". The `set netsnmp restart' command restarts the agent. The `show netsnmp info' command shows general information about the netsnmp/ucdsnmp agent such as the version number and the software configuration. The `show netsnmp load' command shows the load indices of the system. This is usually the length of the queue in front of the processor(s) averaged over some time interval. The `show netsnmp exec' command shows information about pre-configured commands that can be invoked. The `show netsnmp proc' command shows information about which processes netsnmp watches. The `dump netsnmp' command generates a sequence of scli commands which can be used to restore the netsnmp specific configuration. 3.13 NORTEL MODE ================ The nortel scli mode allows to manipulate virtual LANs (vlans) on nortel bridges. It is based on the RAPID-CITY MIB which is implemented at least on the baystack bridges. `create nortel bridge vlan ' `delete nortel bridge vlan ' `set nortel bridge vlan name ' `set nortel bridge vlan ports ' `set nortel bridge vlan default ' `show nortel bridge vlan info []' `show nortel bridge vlan details []' `show nortel bridge vlan ports' `dump nortel bridge vlan' The `create nortel bridge vlan' command is used to create a new virtual LAN with the given and . The `delete nortel bridge vlan' command deletes all selected virtual LANs. The regular expression is matched against the virtual LAN names to select the vlans that should be deleted. The `set nortel bridge vlan name' command changes the name of a virtual LAN. The `set nortel bridge vlan ports' command allows to assign ports to port-based vlans. The regular expression is matched against the vlan names to select the vlans that should be modified. The argument contains a comma separated list of port numbers or port number ranges, e.g. 1,5,7-8. The `set nortel bridge vlan default' command allows to assign ports to a default vlan. The argument is matched against the vlan names to select the vlan. The argument contains a comma separated list of port numbers or port number ranges, e.g. 1,5,7-8. The `show nortel bridge vlan info' command shows summary information about all selected virtual LANs. The optional regular expression is matched against the virtual LAN names to select the virtual LANs of interest. The command generates a table with the following columns: VLAN number of the virtual LAN STATUS status of the virtual LAN (see below) NAME name of the virtual LAN PORTS ports assigned to the virtual LAN The status is encoded in four characters. The first character indicates the status of the row (A=active, S=not in service, R=not ready). The second character indicates virtual LAN type (P=port, I=IP-subnet, O=protocol, S=src address, D=dst address). The third character indicates the priority of the virtual LAN (H=high, N=normal) and the fourth character indicates whether routing is enabled (R=routing, N=no routing). The `show nortel bridge vlan details' command describes the selected vlans in more detail. The optional regular expression is matched against the vlan names to select the vlans of interest. The `show nortel bridge vlan ports' command shows information for each vlan port. The command generates a table with the following columns: PORT port number FLAGS port vlan flags (see below) DEFAULT default vlan number VLANS vlan numbers the port is member of The flags are encoded in four characters. The first character indicates the port type (A=access, T=trunk). The second character indicates whether the port tags frames (T=tagging, N=none). The third character indicates whether the port discards tagged frames (D=discard, N=none) and the fourth character indicates whether the port discards untagged frames (D=discard, N=none). The `dump nortel bridge vlan' command generates a sequence of scli commands which can be used to restore the virtual LAN configuration. 3.14 OSPF MODE ============== The scli ospf mode is used to display and configure OSPF parameters. `show ospf area' `show ospf info' `show ospf interface' `show ospf lsdb' show OSPF areas general OSPF information show OSPF interfaces show OSPF lsdb 3.15 PRINTER MODE ================= The scli printer mode is based on the Printer-MIB as published in RFC 1759 and some updates currently being worked on in the IETF Printer MIB working group. `set printer operator ' `show printer info' `show printer paths' `show printer inputs' `show printer outputs' `show printer markers' `show printer colorants' `show printer supplies' `show printer interpreters' `show printer channels' `show printer covers' `show printer display' `show printer lights' `show printer alerts' `monitor printer display' `monitor printer lights' `monitor printer alerts' `run printer reboot' The `set printer operator' command configures the name of the person responsible for operating a printer. As a convention, the phone number, fax number or email address should be indicated by the tel:, fax: and mailto: URL schemes. The `show printer info' command shows general information about the printer including global status information. The `show printer paths' command shows information about the media paths of a printer. The `show printer inputs' command shows information about the input sub-units of a printer which provide media for input to the printing process. The `show printer output' command shows information about the output sub-units of a printer capable of receiving media delivered from the printing process. The `show printer markers' command shows information about the marker sub-units of a printer which produce marks on the print media. The `show printer colorants' command shows information about the colorant sub-units of a printer which produce marks on the print media. The `show printer supplies' command shows information about the supplies which are consumed and the waste produced by the markers of a printer. The `show printer interpreters' command shows information about the page description language and control language interpreters supported by the printer. The `show printer channels' command shows information about the channels which can be used to submit data to the printer. The `show printer covers' command shows information about the covers of a printer. The `show printer display' command shows the current contents of the display attached to the printer. The command generates a table with the following columns: PRINTER logical printer number LINE display line number TEXT contents of the display line The `show printer lights' command shows the current status of the lights attached to the printer. The command generates a table with the following columns: PRINTER logical printer number LIGHT number identifying the light/led DESCRIPTION description of the light/led STATUS current status (on, off, blink) COLOR current color of the light The `show printer alerts' command displays the list of active printer alerts including the alert code, the alert severity, the alert description, the alert time, the alert location and the personel required to handle the alert. The `monitor printer display' command shows the same information as the show printer display command. The information is updated periodically. The `monitor printer lights' command shows the same information as the show printer lights command. The information is updated periodically. The `monitor printer alerts' command shows the same information as the show printer alerts command. The information is updated periodically. The `run printer reboot' command resets the printed. RS232 MODE The rs232 scli mode is based on the RS-232-MIB as published in RFC 1659. `show rs232 details' The `show rs232 details' command describes the selected RS 232 interfaces in detail. 3.16 SCLI MODE ============== The scli mode provides commands that can be used to display and manipulate the internal state of the scli interpreter. `open []' `close' `run scli walk [ ...]' `run scli scan [community]' `run scli sleep ' `create scli plugin ' `delete scli plugin ' `exit' `help' `history' `create scli alias ' `delete scli alias ' `create scli interp ' `delete scli interp ' `set scli regex []' `set scli debugging []' `set scli pager ' `set scli retries ' `set scli timeout ' `set scli format ' `set scli mode ' `show scli info' `show scli command info []' `show scli command details []' `show scli command tree' `show scli aliases' `show scli modes []' `show scli schema []' `show scli alarm info' The `open' command establishes an association to a remote SNMP agent. The argument is the DNS name or the IP address of the remote node. Scli will try to talk to the SNMP agent on this node by using the default port number (usually 161) and the default transport mapping (usually SNMP over UDP). The optional argument is the community string needed to communicate with the remote SNMP agent. The default community string is "public". Opening an association while an association is already established is not considered an error. The existing established association will be closed automatically before an attempt to create a new association is started. The `close' command closes an established association to a remote SNMP agent. Invoking the close command when no association is established is not considered an error and will do just nothing. The `run scli walk' command is a debugging utility which simply performs a MIB walk. Note that scli does not have general MIB knowledge and hence the output requires some post-processing. The `run scli scan' command is a utility which scans an IPv4 address space identified by the argument. The must be specified in the format /. The optional argument is the community string needed to communicate with the remote SNMP agent. The default community string is "public". The `run scli sleep' command simply sleeps for the given amount of seconds. The `create scli plugin' command dynamically loads an scli mode into a running scli process. This can be used to dynamically extend scli with modules coming from other sources. Dynamic loadable modules also simplify the development and management of site-specific modules. The `delete scli plugin' command removes a previously loaded modules from a running scli process. The `exit' command terminates the scli interpreter. An end of file in the standard input stream will also terminate the the scli interpreter. The `help' command displays some help information including a list of all top-level scli commands. The `history' command displays the scli command history list with line numbers. The `create scli alias' command creates the alias for the scli command (fragment) . If the alias already exists, then the new will be assigned to the existing alias. The `delete scli alias' command removes previously defined aliases from the scli interpreter. The regular expression is matched against all alias names in order to select the aliases that are deleted. The `create scli interp' command creates a new internal scli interpreter with the name . The `delete scli interp' command deletes previously defined scli interpreters from the main scli interpreter. The regular expression is matched against all alias names in order to select the interpreter(s) to be removed. The `set scli regex' command controls how scli matches regular expressions. The optional regular expression is matched against the regular expression options. A successful match turns a regular expression option on while an unsuccessful match turns a regular expression option off. Invoking the command without the argument will turn all regular expression options off. The currently defined regular expression options are "extended" for POSIX extended regular expressions and "case-insensitive" for case insensitive matches. The `set scli debugging' command sets the debugging level of the SNMP engine. The optional regular expression is matched against the debugging levels. A successful match turns a debugging level on while an unsuccessful match turns a debugging level off. Invoking the command without the argument will turn all debugging levels off. The currently defined debugging levels are "session" for the SNMP session layer, "request" for the SNMP request handling layer, "transport" for the SNMP transport layer, "packet" for the SNMP packet layer, and "asn1" for the ASN.1 coding layer. The `set scli pager' command defines the shell command which is used as a pager if the output produced by an scli command does not fit on a single screen. The output is passed to the shell command via its standard input stream. The `set scli retries' command defines the number of SNMP request retries before giving up requesting a certain object. The `set scli timeout' command defines the number milliseconds between subsequent SNMP request retries. The `set scli format' command defines the output format used by subsequent scli commands. The currently supported formats are "scli" and "xml". The "scli" format is the default output format and described in this documentation. The "xml" output format is experimental and therefore not described here. The `set scli mode' command defines the scli mode used by subsequent scli commands. Setting the mode to "protocol" will force scli to work in protocol mode. Setting the mode to "normal" causes scli to work in normal mode where certain status messages are suppressed. The `show scli info' command displays the current status of the scli interpreter. The `show scli command info' command displays summary information about scli commands. The optional regular expression is matched against the command names to select the scli commands. The `show scli command details' command displays detailed information about scli commands. The optional regular expression is matched against the command names to select the scli commands. The `show scli command tree' command displays the scli command tree. The full command syntax is displayed for each leaf node. The `show scli aliases' command lists all scli command aliases. The first column in the generated table lists the aliase names while the second column shows the alias values. The `show scli modes' command shows information about the scli modes. An scli mode is a logical grouping of related commands (e.g., all commands that deal with printers). The optional regular expression can be use to select a subset of the available scli modes. The `show scli schema' command produces xml schema definitions for the selected scli modes. An scli mode is a logical grouping of related commands (e.g., all commands that deal with printers). The optional regular expression can be use to select a subset of the available scli modes. The `show scli alarm info' command displays summary information about all known alarms. 3.17 SNMP MODE ============== The snmp scli mode is based on the SNMPv2-MIB as published in RFC 1907, the SNMP-FRAMEWORK-MIB as published in RFC 3411, the SNMP-USER-BASED-SM-MIB as published in RFC 3414, the SNMP-VIEW-BASED-ACM-MIB as published in RFC 3415, the SNMP-TARGET-MIB as published in RFC 3413, the SNMP-NOTIFICATION-MIB as published in RFC 3413, and theNOTIFICATION-LOG-MIB as published in RFC 3014. `create snmp vacm member []' `delete snmp vacm member []' `create snmp usm user