CLI Overview
CLI Overview
1 CLI Overview
The device provides various command views. For the methods of entering the command
views except the following views, see the CloudEngine 12800 Series Switches Command
Reference.
How To Enter: When a user logs in to the device, the user enters the user view and the
following prompt is displayed:
<HUAWEI>
l System view
In the system view, you can set the system parameters of the device, and enter other
function views from this view.
How To Enter: Run the system-view command and press Enter in the user view. The
system view is displayed.
<HUAWEI> system-view
Enter system view, return user view with return command.
[~HUAWEI]
l Interface view
In the interface view, you can configure interface parameters including physical
attributes, link layer protocols, and IP addresses.
How To Enter: Run the interface command and specify an interface type and number to
enter the interface view.The interface 10GE is used as an example.
[~HUAWEI] interface 10ge X/Y/Z
[~HUAWEI-10GEX/Y/Z]
X/Y/Z indicates the number of an interface that needs to be specified. It is in the format of
slot number/card number/interface sequence number.
l Routing protocol view
In routing protocol views, you can configure most routing protocol parameters. The
routing protocol views include the IS-IS view, OSPF view, and RIP view.
How To Enter: Run a command to activate a routing protocol process in the system view.
The corresponding routing protocol view is displayed.
[~HUAWEI] isis
[*HUAWEI-isis-1]
The command line prompt HUAWEI is the default host name (sysname). The prompt
indicates the current view. For example, <> indicates the user view and [] indicates all other
views except the user view.
You can enter ! or # followed by a character string in any view. All entered content
(including ! and #) is displayed as comments. That is, the corresponding configuration is not
generated.
NOTE
l Some commands can be executed in multiple views, but they have different functions after being
executed in different views. For example, you can run the lldp enable command in the system view
to enable LLDP globally and in the interface view to enable LLDP on an interface.
l In the system view, you can run the diagnose command to enter the diagnostic view. Diagnostic
commands are used for device fault diagnosis. If you run some commands in the diagnostic view, the
device may fail to run properly or services may be interrupted. Contact technical support personnel
and use these diagnostic commands with caution.
For example, after you run the quit command to return from the AAA view to the system
view, you can run the quit command again to return from the system view to the user view.
[~HUAWEI-aaa] quit
[~HUAWEI] quit
<HUAWEI>
To return from the AAA view directly to the user view, press Ctrl+Z or run the return
command.
# Press Ctrl+Z to return directly to the user view.
[~HUAWEI-aaa] // Enter Ctrl+Z
<HUAWEI>
In two-phase validation mode, you must run the commit command for the configuration to
take effect. However, you do not need to run the commit command in the following cases:
l Query commands (such as display interface) are run.
l Maintenance commands (such as slave switchover, dual-active restore,
stack upgrade fast rollback-timer, stack upgrade fast stack member, switch mode,
and reset keepalive packets count) are run.
l Commands are run to enter the existing views (such as the stack view and physical
interface view) on a physical device. For example, the interface 10ge1/0/1 command is
run.
l The existing configurations on a device are reconfigured.
Immediate Mode
Run: system-view immediately, Enable the immediate mode.
In the immediate mode, the command prompt is as follows:
<HUAWEI> system-view immediately
Enter system view, return user view with return command.
[HUAWEI]
Two-Stage Mode
1. Run: system-view, enable the two-stage mode.
2. (Optional) Run: display configuration candidate [ merge ], display all uncommitted
configurations.
If you specify the merge keyword, the command displays uncommitted configurations
and committed configurations. If you do not specify the merge keyword, the command
displays uncommitted configurations.
You can edit the uncommitted configurations.
3. (Optional) Run: clear configuration candidate, delete all the uncommitted
configurations.
NOTE
l In both the immediate mode and two-stage mode, the system can lock the configuration of a service
as soon as the service process is initiated, to prevent a service from being affected. When the
configuration is locked, users can query configurations but cannot edit or commit configurations. If
configurations fail to be committed, waiting for 30 seconds and committing configurations again are
recommended. If configurations fail to be committed again, it indicates that the configuration is
locked by a user.
l You can run the configuration exclusive command to lock a configuration. If a configuration is
locked by another user, ask the user to unlock it.
l In two-phase configuration mode, when you perform the same configurations for multiple users,
only the configuration committed first takes effect. For other users, the system prompts a
configuration conflict.
Context
l The system grants users different access permissions based on their roles. User levels are
classified into sixteen levels, which correspond to the command levels. Users can use
only the commands at the same or lower level than their own levels. By default, there are
four command levels 0 to 3 and sixteen user levels 0 to 15. Table 1-2 describes the
relationship between command levels and user levels.
NOTICE
Changing the default command level without the guidance of technical personnel is not
recommended. This may result in inconvenience for operation and maintenance and bring
about security problems.
Procedure
Step 1 Run:
system-view
Step 2 Run:
command-privilege level level view view-name command-key
You can use the command only when your user level is 15.
If the level of a command has been changed using the command-privilege level command,
the level of this command remains unchanged after you run the command-privilege level
rearrange command. Levels of the other commands are changed as follows:
The original command levels 0, 1, 2, and 3 are updated to 0, 1, 10, and 15 respectively. There
are no commands at levels 2 to 9 and levels 11 to 14. You can set commands to any of these
levels to manage user rights.
Step 4 Run:
commit
----End
Editing Feature
You can edit commands in a CLI that supports multi-line edition. Each command can contain
a maximum of 1022 characters. The keywords in the commands are case insensitive. Whether
a command parameter is case sensitive or not depends on what the parameter is.
Table 1-3 lists keys that are frequently used for command editing.
Common key Inserts a character at the current location of the cursor if the
editing buffer is not full, and the cursor moves to the right.
Otherwise, an alarm is generated.
Backspace Deletes the character on the left of the cursor and the cursor
moves to the left. When the cursor reaches the head of the
command, an alarm is generated.
Left cursor key ← or Ctrl Moves the cursor to the left by the space of a character. When
+B the cursor reaches the head of the command, an alarm is
generated.
Key Function
Right cursor key → or Moves the cursor to the right by the space of a character. When
Ctrl+F the cursor reaches the end of the command, an alarm is
generated.
Operating Techniques
Incomplete Keyword
You can enter incomplete keywords on the device. In the current view, you do not need to
enter complete keywords if the entered characters can match a unique keyword. This function
improves operating efficiency.
For example, to execute the display current-configuration command, you can enter d cu, di
cu, or dis cu, but you cannot enter d c or dis c because they do not match unique keywords.
NOTICE
The maximum length of a command (including the incomplete command) to be entered is
1022 characters. If a command in incomplete form is configured, the system saves the
command to the configuration file in its complete form, which may cause the command to
have more than 1022 characters. In this case, the command in incomplete form cannot be
restored after the system restarts. Therefore, when you configure a command in incomplete
form, pay attention to the length of the command.
Tab
Enter an incomplete keyword and press Tab to complete the keyword.
l When a unique keyword matches the input, the system replaces the incomplete input
with the unique keyword and displays it in a new line with the cursor leaving a space
behind. For example:
a. Enter an incomplete keyword.
[~HUAWEI] info-
b. Press Tab.
The system replaces the entered keyword and displays it in a new line with the
complete keyword followed by a space.
[~HUAWEI] info-center
l When the input has multiple matches, press Tab repeatedly to display the keywords
beginning with the incomplete input in a circle until the desired keyword is displayed. In
this case, the cursor closely follows the end of the keyword. For example:
a. Enter an incomplete keyword.
[~HUAWEI] info-center log
b. Press Tab.
The system displays the prefixes of all the matched keywords. In this example, the
prefix is log.
[~HUAWEI] info-center log-severity
Press Tab to switch from one matched keyword to another. In this case, the cursor
closely follows the end of a word.
[~HUAWEI] info-center logbuffer
[~HUAWEI] info-center logfile
[~HUAWEI] info-center loghost
b. Press Tab.
[~HUAWEI] info-center loglog
The system displays information in a new line, but the keyword loglog remains
unchanged and there is no space between the cursor and the keyword, indicating
that this keyword does not exist.
Full Help
When entering a command, you can use the full help function to obtain keywords and
parameters for the command. Use any of the following methods to obtain full help from a
command line.
l Enter a question mark (?) in any command view to obtain all the commands and their
simple descriptions. For example:
<HUAWEI> ?
Current view commands:
activate Activate locked user
backup Backup information
capture-packet Enable capturing packet
cd Change current directory
check Check Version
clear Clear operation
clock Clock status and configuration information
copy Copy from one file to another
...
l Enter some keywords of a command and a question mark (?) separated by a space. All
keywords associated with this command, as well as simple descriptions, are displayed.
For example:
<HUAWEI> system-view
[~HUAWEI] user-interface vty 0 4
[~HUAWEI-ui-vty0-4] authentication-mode ?
aaa AAA authentication
password Authentication through the password of a user terminal interface
[~HUAWEI-ui-vty0-4] authentication-mode aaa ?
| Matching output
> Redirect the output to a file
>> Redirect the output to a file in append mode
<cr>
Partial Help
If you enter only the first or first several characters of a command keyword, partial help
provides keywords that begin with this character or character string. Use any of the following
methods to obtain partial help from a command line.
l Enter a character string followed directly by a question mark (?) to display all keywords
that begin with this character string. For example:
<HUAWEI> d?
debugging delete
dir display
<HUAWEI> d
l Enter a command and a string followed directly by a question mark (?) to display all the
keywords that begin with this string. For example:
<HUAWEI> display b?
bfd bgp
l Enter the first several letters of a keyword in a command and press Tab to display a
complete keyword. The first several letters, however, must uniquely identify the
keyword. If they do not identify a specific keyword, press Tab continuously to display
different keywords and you can select one as required.
NOTE
The command output obtained through the online help function is used for reference only.
Error: Too many parameters found at Too many parameters are entered.
'^' position.
<HUAWEI> system-view
[~HUAWEI] header login information "Hello,Welcome to Huawei!"
[*HUAWEI] commit
Log out of the terminal and re-log in. A message "Hello, Welcome to Huawei!" is
displayed before authentication. Run the undo header login command.
Hello,Welcome to Huawei!
Password:
Info: The max number of VTY users is 21, and the number of current VTY users
on
line is 2.
The current login time is 2012-06-06 16:31:24.
<HUAWEI> system-view
[~HUAWEI] undo header login
[*HUAWEI] commit
Log out of the terminal and re-log in. No message is displayed before authentication.
Password:
Info: The max number of VTY users is 21, and the number of current VTY users
on
line is 2.
The current login time is 2012-06-06 16:45:06.
<HUAWEI>
NOTE
The command output provided here is used for reference only. The actual output information may differ
from the preceding information.
By default, the system saves 10 history commands for each user. Run the history-command
max-size size-value command to reset the number of history commands that can be saved in a
specified user interface view. The maximum number is 256.
NOTE
If the value specified in the history-command max-size size-value command is large, it may take a long
time to obtain a required history command. Therefore, a large value is not recommended.
Display the later Down arrow key ↓ or Ctrl+N A later history command is
history command. displayed. If the current
command is the latest
command, no output is
displayed and an alarm is
generated when you attempt
to display the later history
command.
NOTE
You cannot access history commands using the Up arrow key ↑ in HyperTerminal Windows 9X. The
Up arrow key ↑ has a different function in HyperTerminal Windows 9X and needs to be replaced by the
shortcut key Ctrl+P.
l The saved history commands are the same as those entered by users. For example, if the
user enters an incomplete command, the saved command also is incomplete.
l If the user runs the same command several times, only the latest command is saved. If
the command is entered in different forms, they are considered as different commands.
For example, if the display current-configuration command is run several times, only
one history command is saved. If the display current-configuration command and the
dis curr command are used, both of them are saved.
l History commands entered by the current user can be deleted using the reset history-
command command in the user view, history commands entered by all users can be
deleted using the reset history-command all-users command in the user view. The
deleted history commands cannot be displayed.
NOTE
The terminal in use may affect the functions of the shortcut keys. For example, if the shortcut keys
defined by the terminal conflict with those defined in the system, the shortcut keys entered by the user
are captured by the terminal program and the commands corresponding to the shortcut keys are not
executed.
The system supports four user-defined shortcut keys and the default values are as follows:
l Ctrl+G: display current-configuration
l Ctrl+L: display ip routing-table
l Ctrl+O: undo debugging all
l Ctrl+U: Null
NOTE
l When defining shortcut keys, use double quotation marks to define the command if this command
contains several keywords separated by spaces. For example, hotkey ctrl_l "display tcp status".
Do not use double quotation marks to define a command if the command contains only one
keyword.
l Run the display hotkey command to view the status of the defined, undefined, and system-defined
shortcut keys.
l Run the undo hotkey command to restore default values of the configured shortcut keys.
l Shortcut keys are executed in the same way as commands. The system can record commands in their
original formats in the command buffer and logs to help query and locate the fault.
l The user-defined shortcut keys are available to all users. If a user does not have the rights to use the
command defined by a shortcut key, the system displays an error message when this shortcut key is
executed.
Key Function
NOTE
l You can run the timestamp enable command to enable the timestamp function in the system so that
the system adds the query time to the output of the display command.
l If the value of a field in the command output is too long, only some beginning characters of the
value are displayed.
Display Feature
When the information cannot be completely displayed on one screen, you can adopt the pause
function. You have three choices, as described in Table 1-8.
Regular Expressions
A regular expression is a mode matching tool. It consists of common characters (such as
letters from a to z) and special characters (called meta-characters). The regular expression is a
template according to which you can search for the required string.
A regular expression provides the following functions:
l Searches for and obtains a sub-string that matches a rule in the string.
l Substitutes a string based on a certain matching rule.
The regular expression consists of common characters and special characters.
l Common characters
Common characters are used to match themselves in a string, including all upper-case
and lower-case letters, digits, punctuations, and special symbols. For example, a matches
the letter "a" in "abc", 10 matches the digit "10" in "10.113.25.155", and @ matches the
symbol "@" in "[email protected]".
l Special characters
Special characters are used together with common characters to match the complex or
special string combination. Table 1-9 describes special characters and their syntax.
+ Matches the preceding element one 10+ matches "10", "100", "1000",
or more times. and so on.
(10)+ matches "10", "1010",
"101010", and so on.
[xyz] Matches any single character in the [123] matches the character 2 in
regular expression. "255".
[^xyz] Matches any character that is not in [^123] matches any character
the regular expression. except for "1", "2", and "3".
[a-z] Matches any character within the [0-9] matches any character
specified range. ranging from 0 to 9.
[^a-z] Matches any character beyond the [^0-9] matches all non-numeric
specified range. characters.
NOTE
Unless otherwise specified, all the characters in the preceding table must be printable characters.
l Degeneration of special characters
Certain special characters, when placed at certain positions in a regular expression,
degenerate to common characters.
– The special characters following "\" match special characters themselves.
– The special characters "*", and "+" are placed at the starting position of the regular
expression. For example, +45 matches "+45" and abc(*def) matches "abc*def".
– The special character "^" is placed at any position except for the start of the regular
expression. For example, abc^ matches "abc^".
– The special character "$" is placed at any position except for the end of the regular
expression. For example, 12$2 matches "12$2".
– A right parenthesis ")" or right bracket "]" is not paired with a corresponding left
parenthesis "(" or bracket "[". For example, abc) matches "abc)" and 0-9] matches
"0-9]".
NOTE
Unless otherwise specified, degeneration rules also apply when the preceding regular expressions
are subexpressions within parentheses.
l Combination of common and special characters
In actual usage, regular expressions combine multiple common and special characters to
match certain strings.
When filtering conditions are set to query output information, the first line of the command output starts
with the entire regular expression but not the string to be filtered.
The system allows you to use | count to display the number of lines, | section to display the
command output by section after using filtering mode, | ignore-case to match a string of case-
insensitive characters, and | no-more to display filtered output information on only one
screen. | count, | section, | ignore-case, and | no-more can work together with the following
filtering modes.
Three filtering modes are provided for commands that support regular expressions.
l | begin regular-expression: displays all the lines beginning with the line that matches the
regular expression.
Filter the character strings to be entered until the specified case-sensitive character string
is displayed. All the character strings following this specified character string are
displayed on the screen.
l | exclude regular-expression: displays all the lines that do not match the regular
expression.
If the character strings to be entered do not contain the specified case-sensitive character
string, they are displayed on the screen. Otherwise, they are filtered.
l | include regular-expression: displays all the lines that match the regular expression.
If the character strings to be entered contain the specified case-sensitive character string,
they are displayed on the screen. Otherwise, they are filtered.
NOTE
Example 2: Run the display current-configuration command to display all the lines that
match the regular expression vlan.
<HUAWEI> display current-configuration | include vlan
vlan batch 2 9 to 20 77 99 200 222 4091
vlan 19
mux-vlan
vlan 222
aggregate-vlan
access-vlan 1
instance 2 vlan 2
carrier-vlan 100
ce-vlan 10
port trunk allow-pass vlan 99 200
igmp-snooping static-router-port vlan 99
port trunk allow-pass vlan 20
port default vlan 77
port trunk allow-pass vlan 20
Example 3: Run the display current-configuration command to display the number of lines
that match the regular expression vlan.
<HUAWEI> display current-configuration | include vlan | count
Total lines: 14.
NOTE
The device can redirect the output of a display command to a specified file in either of the
following modes:
l > filename
The output is redirected to a specified file. If the file already exists, the content of the file
is overwritten.
l >> filename
The output is appended to a specified file, with the original content of the file remaining
unchanged.
Figure 1-1 Networking diagram for configuring user services in immediate mode
Switch User
IP
Network
Configuration Roadmap
The configuration roadmap is as follows:
1. Choose the immediate mode so that the device automatically submits the configuration
and the configuration immediately takes effect.
2. Perform and verify the configuration.
Procedure
Step 1 Choose the immediate mode.
<HUAWEI> system-view immediately
----End
Configuration Files
#
interface Vlanif10
ip address 10.10.10.1 255.255.0.0
#
interface 10GE1/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
return
Networking Requirements
As shown in Figure 1-2, user A and user B log in to the device at the same time. After user A
configures a service on the device, user B performs the same configuration for the service on
the device.
Figure 1-2 Networking diagram for multiple users to configure a same service in two-stage
mode
UserA
Switch
IP
Network UserB
When user B submits a configuration that is the same as the configuration submitted by user
A, the system will notify user B that the configuration conflicts with an existing
configuration.
Configuration Roadmap
The configuration roadmap is as follows:
1. User A and user B configure the same service successively.
2. User A submits the configuration.
3. User B submits the configuration.
Procedure
Step 1 User A and user B configure the same service successively.
l User A configures the IP address of VLANIF 10 to be 10.10.10.1.
<HUAWEI> system-view
[~HUAWEI] vlan 10
[*HUAWEI-vlan10] quit
[*HUAWEI] interface 10ge 1/0/1
[*HUAWEI-10GE1/0/1] port link-type trunk
[*HUAWEI-10GE1/0/1] port trunk allow-pass vlan 10
[*HUAWEI-10GE1/0/1] quit
[*HUAWEI] interface vlanif 10
[*HUAWEI-Vlanif10] ip address 10.10.10.1 255.255.0.0
The system prompts user B that the configuration of user B conflicts with that of user A.
----End
Configuration Files
#
interface Vlanif10
ip address 10.10.10.1 255.255.0.0
#
interface 10GE1/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
return
Networking Requirements
As shown in Figure 1-3, user A and user B log in to the device at the same time. After user A
configures a service on the device, user B performs a different configuration for the service on
the device. For example, two users configure different IP addresses on the same interface.
Figure 1-3 Networking diagram for multiple users to perform different configurations for a
same service in two-stage mode
UserA
Switch
IP
Network UserB
When user B submits the configuration, the configuration will overwrite the configuration
submitted by user A.
Configuration Roadmap
The configuration roadmap is as follows:
1. User A and user B perform different configurations for a same service.
2. User A submits the configuration.
3. User B submits the configuration.
Procedure
Step 1 User A and user B perform different configurations for a same service.
l User A configures the IP address of VLANIF 10 to be 10.10.10.1.
<HUAWEI> system-view
[~HUAWEI] vlan 10
[*HUAWEI-vlan10] quit
[*HUAWEI] interface 10ge 1/0/1
[*HUAWEI-10GE1/0/1] port link-type trunk
[*HUAWEI-10GE1/0/1] port trunk allow-pass vlan 10
[*HUAWEI-10GE1/0/1] quit
[*HUAWEI] interface vlanif 10
[*HUAWEI-Vlanif10] ip address 10.10.10.1 255.255.0.0
# Run the display this command in the current view. The command output shows that the
configuration of user B overwrites the configuration submitted by user A.
[~HUAWEI-Vlanif10] display this
#
interface Vlanif10
ip address 10.10.10.100 255.255.0.0
#
return
----End
Configuration Files
#
interface Vlanif10
ip address 10.10.10.100 255.255.0.0
#
interface 10GE1/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
return
Networking Requirements
As shown in Figure 1-4, user A and user B log in to the device at the same time. After user A
configures a service on the device, user B configures another service on the device.
Figure 1-4 Networking diagram for multiple users to configure different services in two-stage
mode
UserA
Switch
IP
Network UserB
If user A and user B submit two configurations of different services, both configurations take
effect.
Configuration Roadmap
The configuration roadmap is as follows:
1. User A and user B configure different services on the device.
2. User A submits the configuration.
3. User B submits the configuration.
Procedure
Step 1 User A and user B configure different services on the device.
l User A configures the IP address of VLANIF 10 to be 10.10.10.1.
<HUAWEI> system-view
[~HUAWEI] vlan 10
[*HUAWEI-vlan10] quit
[*HUAWEI] interface 10ge 1/0/1
[*HUAWEI-10GE1/0/1] port link-type trunk
[*HUAWEI-10GE1/0/1] port trunk allow-pass vlan 10
[*HUAWEI-10GE1/0/1] quit
[*HUAWEI] interface vlanif 10
[*HUAWEI-Vlanif10] ip address 10.10.10.1 255.255.0.0
#
interface Vlanif10
ip address 10.10.10.1 255.255.0.0
...
#
interface 10GE1/0/1
port link-type trunk
port trunk allow-pass vlan 10
...
#
return
----End
Configuration Files
#
FTP server enable
#
interface Vlanif10
ip address 10.10.10.1 255.255.0.0
#
interface 10GE1/0/1
port link-type trunk
port trunk allow-pass vlan 10
#
return
Configuration Roadmap
The configuration roadmap is as follows:
1. If there is only one match for the incomplete keyword, enter the incomplete keyword and
press Tab.
2. If there are several matches for the keyword, enter the incomplete keyword and press
Tab repeatedly until the desired keyword is displayed.
3. Enter the incorrect keyword and press Tab. In this case, the incorrect keyword remains
unchanged.
Use Tab if:
There Is Only One Match for an Incomplete Keyword
1. Enter an incomplete keyword.
[*HUAWEI] info-
2. Press Tab.
The system replaces the entered keyword and displays it in a new line with the complete
keyword followed by a space.
[*HUAWEI] info-center
# The keyword info-center can be followed by the following keywords. (The command
output provided here is used for reference only. The actual output information may differ from
the following information.)
[*HUAWEI] info-center ?
channel Set the name of information channel
console Setting of console configuration
enable Enable the information center
filter-id Specify the configuration of the ID filtering table
log-severity Set log severity
logbuffer Setting of log buffer configuration
logfile Setting of logfile configuration
loghost Setting of logging host configuration
max-logfile-number Setting of logfile numbers
monitor Setting of monitor configuration
snmp Setting of snmp configuration
source Information source setting
statistic-suppress Suppression that the first occurrence of an event is
always logged immediately, but subsequence identical
messages are suppressed
timestamp Set the time stamp type of information
trapbuffer Setting of trap buffer configuration
2. Press Tab.
The system displays the prefixes of all the matched keywords. In this example, the prefix
is log.
[*HUAWEI] info-center log-severity
Press Tab to switch from one matched keyword to another. In this case, the cursor
closely follows the end of a word.
[*HUAWEI] info-center logbuffer
[*HUAWEI] info-center logfile
[*HUAWEI] info-center loghost
2. Press Tab.
[*HUAWEI] info-center loglog
The system displays information in a new line, but the keyword loglog remains
unchanged and there is no space between the cursor and the keyword, indicating that this
keyword does not exist.
Networking Requirements
The user always uses a command to configure services and query information on any device
in a network. The frequent command input brings a low efficiency; therefore, the user
requires fast command input and execution.
Configuration Roadmap
The configuration roadmap is as follows:
1. Define shortcut keys to improve the command input efficiency. For example, define the
shortcut key Ctrl+U and associate it with the display ip routing-table command. To
view information in the routing table, press the shortcut key Ctrl+U.
2. Enter Ctrl+U at the prompt [*HUAWEI] to run the defined command and view the
execution result.
Procedure
Step 1 Define the shortcut key Ctrl+U, associate it with the display ip routing-table command, and
run the command.
<HUAWEI> system-view
[*HUAWEI] hotkey ctrl_u "display ip routing-table"
[*HUAWEI] commit
Step 2 Press Ctrl+U at the prompt of [*HUAWEI] to run the display ip routing-table command.
[*HUAWEI] display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Table : _public_
Destinations : 22 Routes : 22
----End