Provider Connectivity Assurance
Support Portal
cisco.com
Login
Ask Eddy AI
Contents
x
Getting Started
Provider Connectivity Assurance
Legacy Orchestrator
Skylight Gateway
Assurance Sensor Agents
Assurance Sensor Capture
Assurance Sensor Control
Assurance Module Dock
Assurance Sensor Modules
Assurance Sensor SFP
Assurance Sensor GT-GT-S, LT-S, and LX-S
Partner Enablement
Accedian Skylight Legacy Products and Documentation
Legal
Powered by
CLI Command Guide
29 Articles
in this category
Contributors
Share this
Print
Share
Contents
CLI Command Guide
29 Articles
in this category
Written by
Jonathan Poole
Share
Skylight Flex Command Line Interface Overview
This article provides a directory of all base CLI commands supported by Skylight Flex . They are intended to be a reference for users and system administrators who will configure Skylight Flex through the CLI interface. The scope of these artic...
Written by
Jonathan Poole
Updated on : 19 Mar 2025
ACL Commands
ACL (Access Control List) CLI commands are categorized as follows: Configuration Commands This section includes ACL configuration commands. deny Command Objective: This command specifies the packets to be deni...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Alarm Manager Commands
Alarms are notifications related to fault detection or any other irregularities. Alarm management CLI commands are categorized as follows: Configuration Commands This section includes alarm management configuration commands. alarm-manager ed...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Audit Logging Commands
The Audit Log is a security application utilized by security personnel to compile an accurate risk assessment; a chronological record of system activities. By using this feature, security personnel can know what is ongoing or being attempted, by ...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
DHCP Commands
DHCP (Dynamic Host Configuration Protocol) CLI commands are categorized as follows: Configuration Commands This section includes DHCP configuration commands. release dhcp Command Objective: This command releases the DHCP lease obtained...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
ECFM Commands
ECFM (Ethernet Connectivity Fault Management) CLI commands are categorized as follows: Enable Commands This section includes ECFM enable commands. ethernet cfm cc enable Command Objective: This command enables the transmission of Conti...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Interface Commands
Interface CLI commands are categorized as follows: Configuration Commands This section includes Interface configuration commands. alias - For interface Command Objective: This command configures the alias name for the interface/L3 Subi...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
IP Commands
An IP (Internet Protocol) is an identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the destination's IP address. The format of an IP address is a 32-bit numeric address written as ...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
L2CP Commands
L2CP CLI commands are categorized as follows: Configuration Commands This section includes L2CP configuration commands. l2protocol-passthrough Command Objective: This command sets the option to pass through L2 protocol packets transpare...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
LLDP Commands
LLDP (Link Layer Discovery Protocol) supports a set of attributes that it uses to discover neighbor devices. These attributes contain type, length, and value descriptions and are referred to as TLVs. LLDP-supported devices can use TLVs to receive ...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
LA Commands
LA (Link Aggregation) is a method of combining physical network links into a single logical link for increased bandwidth. Link Aggregation CLI commands are categorized as follows: Enable and Disable Commands This section includes LA enable a...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Platform Monitor Commands
This section presents a detailed description of the CLI commands used to configure and review the configuration of the Platform Monitor application. Platform Monitor CLI commands are categorized as follows: Configuration Command This sect...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
PMON Commands
PMON (Performance Monitoring) is used for collecting the history of statistics for port based, proactive SLM and DMM sessions. PMON commands are categorized as follows: Configuration Commands This section includes PMON configuration commands...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
PNAC Commands
PNAC (Port Based Network Access Control) CLI commands are categorized as follows: Configuration Command This section include the PNAC configuration command. shutdown dot1x Command Objective: This command shuts down the dot1x feature. By...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
QoS Commands
QoS (Quality of Service) CLI commands are categorized as follows: Enable and Disable Commands This section includes the QoS enable and disable commands. qos Command Objective: This command enables / disables the QoS subsystem. Syntax...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
RADIUS Commands
RADIUS (Remote Authentication Dial-In User Service) CLI commands are categorized as follows: Configuration Command This section includes the RADIUS configuration command. radius-server host Command Objective: This command configures the...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
RMON Commands
RMON (Remote Monitoring) is a standard monitoring specification that allows network monitors and console systems to exchange network-monitoring data. RMON CLI commands are categorized as follows: Enable and Disable Commands This section incl...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
SFTP Commands
SFTP (Secure File Transfer Protocol) CLI commands are categorized as follows: Configuration Commands This section includes the SFTP configuration command. sftp port Command Objective: This command configures the default SFTP port number...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
SNMP Commands
SNMP (Simple Network Management Protocol) CLI commands are categorized as follows: Configuration Commands This section includes SNMP configuration commands. snmp access Command Objective: This command configures the SNMP group access de...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
STP Commands
STP (Spanning Tree Protocol) is a link management protocol that provides path redundancy while preventing undesirable loops in the network created by multiple active paths between stations. To establish path redundancy, STP creates a tree that spa...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Syslog Commands
Syslog is a standard for logging program messages. It separates the software that generates and stores messages from the software that reports and analyzes them. Syslog is a protocol used for capturing log information for devices on a network. T...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
System Clock Commands
The Clock IWF (Inter Working Functionality) module functions as a layer between the system clock and the protocol that synchronizes the system clock. This module selects the time source to set the system clock and maintains the information regar...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
TACACS Commands
TACACS (Terminal Access Controller Access Control System) , widely used in network environments, is a client/server protocol that allows remote access servers to communicate with a central server in order to authenticate dial-in users and authorize...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Telemetry Commands
Telemetry CLI commands are categorized as follows: Enable and Disable Command This section includes the telemetry enable and disable commands. set telemetry Command Objective: This command enables and disables the telemetry module. S...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
TWAMP Commands
TWAMP (Two-Way Active Measurement Protocol) CLI commands are categorized as follows: Configuration Commands This section includes TWAMP configuration commands. test-session (TWAMP Sender) Command Objective: This command configures the T...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Unit Management Commands
Unit management commands are used to manage access permissions, mode access and terminal configurations. Unit management CLI commands are categorized as follows: Configuration Commands This section includes unit ma...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
VLAN Commands
VLANs (Virtual LANs) can be considered a group of devices on different physical LAN segments that can communicate with one another as if they were all on the same physical LAN segment. VLANs are highly flexible because they are configured through ...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Y.1564 Commands
Y.1564 CLI commands are categorized as follows: Enable and Disable Commands This section includes Y.1564 enable and disable commands. shutdown y1564 Command Objective: This command shuts down the Y.1564 module. This implies that all re...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
ZTP Commands
ZTP (Zero Touch Provisioning) CLI commands are categorized as follows: Configuration Commands This section includes ZTP configuration commands. set beacon advertisment Command Objectiv...
Written by
Jonathan Poole
Updated on : 18 Mar 2025
Change password!
Changing your password will log you out immediately. Use the new password to log back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update
Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout
ENTER
ESC
Eddy AI, facilitating knowledge discovery through conversational intelligence
Search Limit Exceeded. Please upgrade the plan.
Answer copied!
No results found
Provide more context or information so that I can better understand and assist you