1-9These hotkeys are defined by the device. When you interact with the device from terminal software,these keys may be defined to perform other operations. If so, the definition of the terminal software willdominate.Configuring Command AliasesYou can replace the first keyword of a command supported by the device with your preferred keywordby configuring the command alias function. For example, if you configure show as the replacement ofthe display keyword for each display command, you can input the command alias show xx to executethe display xx command.Note the following when you configure command aliases:z When you input a command alias, the system displays and saves the command in its originalformat instead of its alias. That is, you can define and use a command alias but the command is notsaved and restored in its alias.z When you define a command alias, the cmdkey and alias arguments must be in complete form.z With the command alias function enabled, when you input an incomplete keyword, which partiallymatches both a defined alias and the keyword of a command, the alias wins; to execute thecommand whose keyword partially matches your input, you need to input the complete keyword.When you input a character string that matches multiple aliases partially, the system prompts youfor various matched information.z If you press Tab after you input the keyword of an alias, the original format of the keyword will bedisplayed.z You can replace only the first keyword of a non-undo command instead of the complete command;and you can replace only the second keyword of undo commands.Follow these steps to configure command aliases:To do… Use the command… RemarksEnter system view system-view —Enable the command aliasfunction command-alias enableRequiredDisabled by default, that is, youcannot configure commandaliases.Configure command aliases command-alias mappingcmdkey aliasRequiredNot configured by default.Configuring User Privilege Levels and Command LevelsIntroductionTo restrict the different users’ access to the device, the system manages the users by their privilegelevels. User privilege levels correspond to command levels. After users at different privilege levels log in,they can only use commands at their own, or lower, levels. All the commands are categorized into four