Command Line Interface Guide
Page 18
show (mst 372 exit (mst 373 abort (mst 374 show spanning-tree 375 spanning-tree guard root 389 29 SSH Commands 391 ip ssh port 391 ip ssh server 391 crypto key generate dsa 392 crypto key generate rsa 393 ip ssh pubkey-auth 393 crypto key pubkey-chain ssh 394 user-key 395 key-string 396 show ip ssh 398 show crypto key mypubkey 399 show crypto key pubkey-chain ssh 400 30 Syslog Commands 401 logging on 401 logging 401 logging console 403 logging buffered 404 logging buffered size 404 clear logging 405 logging file 406 18 Contents
show (mst 372 exit (mst 373 abort (mst 374 show spanning-tree 375 spanning-tree guard root 389 29 SSH Commands 391 ip ssh port 391 ip ssh server 391 crypto key generate dsa 392 crypto key generate rsa 393 ip ssh pubkey-auth 393 crypto key pubkey-chain ssh 394 user-key 395 key-string 396 show ip ssh 398 show crypto key mypubkey 399 show crypto key pubkey-chain ssh 400 30 Syslog Commands 401 logging on 401 logging 401 logging console 403 logging buffered 404 logging buffered size 404 clear logging 405 logging file 406 18 Contents
Command Line Interface Guide
Page 25
... configuring the device, the Command Line Interface (CLI) is divided into different command modes. Using the CLI 25 Entering a question mark "?" at the system prompt (console prompt) displays a list of specific commands. The following figure illustrates the command mode access path. From each mode a specific command is as follows: User EXEC...
... configuring the device, the Command Line Interface (CLI) is divided into different command modes. Using the CLI 25 Entering a question mark "?" at the system prompt (console prompt) displays a list of specific commands. The following figure illustrates the command mode access path. From each mode a specific command is as follows: User EXEC...
Command Line Interface Guide
Page 26
... not change the configuration. The Interface Configuration mode configures specific interfaces in the User EXEC command mode unless the user is the User EXEC mode. Console> 26 Using the CLI This level is required. Only a limited subset of the device host name followed by the angle bracket (>). The Global Configuration mode...
... not change the configuration. The Interface Configuration mode configures specific interfaces in the User EXEC command mode unless the user is the User EXEC mode. Console> 26 Using the CLI This level is required. Only a limited subset of the device host name followed by the angle bracket (>). The Global Configuration mode...
Command Line Interface Guide
Page 27
...many of the device host name followed by #. The configure Privileged EXEC mode command is Console unless it was changed using the hostname command in the Global Configuration mode. Console# To return from the User EXEC mode, perform the following example illustrates how to ...access the Privileged EXEC mode and return to the User EXEC mode: Console> enable Enter Password: ****** Console# Console# disable Console> The exit (mst) command is ...
...many of the device host name followed by #. The configure Privileged EXEC mode command is Console unless it was changed using the hostname command in the Global Configuration mode. Console# To return from the User EXEC mode, perform the following example illustrates how to ...access the Privileged EXEC mode and return to the User EXEC mode: Console> enable Enter Password: ****** Console# Console# disable Console> The exit (mst) command is ...
Command Line Interface Guide
Page 28
...following example illustrates how to access the Global Configuration mode and return to the Privileged EXEC mode: Console# Console# configure Console(config)# exit Console# Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands modify specific interface operations. Contains... user can use one of the device host name followed by (config) and #. Contains commands to manage port configuration. Console(config)# To return from the Global Configuration mode to enter the Management Access List Configuration mode. • Ethernet - Contains...
...following example illustrates how to access the Global Configuration mode and return to the Privileged EXEC mode: Console# Console# configure Console(config)# exit Console# Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands modify specific interface operations. Contains... user can use one of the device host name followed by (config) and #. Contains commands to manage port configuration. Console(config)# To return from the Global Configuration mode to enter the Management Access List Configuration mode. • Ethernet - Contains...
Command Line Interface Guide
Page 29
...CAUTION: When using the CLI, perform the following commands to none. b Set Flow Control to begin the configuration procedure: Console> enable Console# configure Console(config)# Using the CLI 29 With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal's VT100 emulation. ... that the setting is very similar to enter the SSH Public Key-chain Configuration mode. • QoS - For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps: 1 Connect the DB9 null-modem or cross over a direct connection to...
...CAUTION: When using the CLI, perform the following commands to none. b Set Flow Control to begin the configuration procedure: Console> enable Console# configure Console(config)# Using the CLI 29 With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal's VT100 emulation. ... that the setting is very similar to enter the SSH Public Key-chain Configuration mode. • QoS - For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps: 1 Connect the DB9 null-modem or cross over a direct connection to...
Command Line Interface Guide
Page 30
... two instances where help information can be displayed: • Keyword lookup - is entered in some instances, parameters required to set a password for the administrator, enter: Console(config)# username admin password alansmith When working with the exit command. To enter commands that require parameters, enter the required parameters after the command keyword...
... two instances where help information can be displayed: • Keyword lookup - is entered in some instances, parameters required to set a password for the administrator, enter: Console(config)# username admin password alansmith When working with the exit command. To enter commands that require parameters, enter the required parameters after the command keyword...
Command Line Interface Guide
Page 32
... command interface range port-channel has the option of the command line. The following table describes the CLI shortcuts. Indicates an individual key on the console. When the command is entered without a parameter, it automatically defaults to all Description In a command line, square brackets indicate an optional entry. Keyboard Shortcuts The...
... command interface range port-channel has the option of the command line. The following table describes the CLI shortcuts. Indicates an individual key on the console. When the command is entered without a parameter, it automatically defaults to all Description In a command line, square brackets indicate an optional entry. Keyboard Shortcuts The...
Command Line Interface Guide
Page 33
...is described in setting up a minimum configuration, so that the device can access the CLI from a VT100 terminal connected to the console port of a Graphical User Interface (GUI) driven software application. Clock Commands Configures clock commands on the device. you achieve greater ...configuration files. The CLI is a basic command-line interpreter similar to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. This guide describes how the Command Line Interface (CLI) is based solely...
...is described in setting up a minimum configuration, so that the device can access the CLI from a VT100 terminal connected to the console port of a Graphical User Interface (GUI) driven software application. Clock Commands Configures clock commands on the device. you achieve greater ...configuration files. The CLI is a basic command-line interpreter similar to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. This guide describes how the Command Line Interface (CLI) is based solely...
Command Line Interface Guide
Page 34
.... Configures and displays GVRP configuration and information. Configures and manages IP addresses on the device. Configures and manages IPv6 addresses on the device. Configures the console and remote Telnet connection. Configures and displays LLDP information. Diagnoses and displays the interface status. Configure Power over -Ethernet Commands Port Channel Commands Port Monitor...
.... Configures and displays GVRP configuration and information. Configures and manages IP addresses on the device. Configures and manages IPv6 addresses on the device. Configures the console and remote Telnet connection. Configures and displays LLDP information. Diagnoses and displays the interface status. Configure Power over -Ethernet Commands Port Channel Commands Port Monitor...
Command Line Interface Guide
Page 35
.... Creates Layer 2 ACLs. Line Configuration Specifies the authentication method list when accessing a Line higher privilege level from a remote telnet or console. Sets a local password to control access to normal and privilege levels. Configuration Specifies authentication methods for a remote telnet or... console. Privileged EXEC Specifies a password on a line. Denies traffic if the conditions defined in the permit statement match. Set ...
.... Creates Layer 2 ACLs. Line Configuration Specifies the authentication method list when accessing a Line higher privilege level from a remote telnet or console. Sets a local password to control access to normal and privilege levels. Configuration Specifies authentication methods for a remote telnet or... console. Privileged EXEC Specifies a password on a line. Denies traffic if the conditions defined in the permit statement match. Set ...
Command Line Interface Guide
Page 53
... configuration command. Access Mode Global Configuration Global Configuration Global Configuration Global Configuration Command Groups 53 Logs messages to the console based on severity. Enters SSH Public Key-chain configuration mode. Enables public key authentication for incoming SSH sessions. ...SSH Public Key SSH Public Key Privileged EXEC Privileged EXEC Privileged EXEC Syslog Commands Command Group logging on logging logging console logging buffered Description Controls error messages logging. Manually specifies a SSH public key. SSH Commands Command Group ip ssh...
... configuration command. Access Mode Global Configuration Global Configuration Global Configuration Global Configuration Command Groups 53 Logs messages to the console based on severity. Enters SSH Public Key-chain configuration mode. Enables public key authentication for incoming SSH sessions. ...SSH Public Key SSH Public Key Privileged EXEC Privileged EXEC Privileged EXEC Syslog Commands Command Group logging on logging logging console logging buffered Description Controls error messages logging. Manually specifies a SSH public key. SSH Commands Command Group ip ssh...
Command Line Interface Guide
Page 65
... messages logged to configure the device. Command Modes 65 Configures a TCP port for use by a secure web browser to the console based on mac access-list management access-class management access-list management logging password min-length Specifies authentication methods for passwords in the...-server ip ssh port ip ssh pubkey-auth ip ssh server lacp system-priority line logging logging buffered logging buffered size logging console logging file logging on severity. Enables the device to be configured from an internal buffer based on severity. Configures the system LACP...
... messages logged to configure the device. Command Modes 65 Configures a TCP port for use by a secure web browser to the console based on mac access-list management access-class management access-list management logging password min-length Specifies authentication methods for passwords in the...-server ip ssh port ip ssh pubkey-auth ip ssh server lacp system-priority line logging logging buffered logging buffered size logging console logging file logging on severity. Enables the device to be configured from an internal buffer based on severity. Configures the system LACP...
Command Line Interface Guide
Page 72
...) Mode Command Group autobaud enable authentication exec-timeout history history size login authentication password password-aging speed Description Configures the line for a remote telnet or console. Specifies the login authentication method list for automatic baud rate detection (autobaud) Specifies the authentication method list when accessing a higher privilege level from a port in...
...) Mode Command Group autobaud enable authentication exec-timeout history history size login authentication password password-aging speed Description Configures the line for a remote telnet or console. Specifies the login authentication method list for automatic baud rate detection (autobaud) Specifies the authentication method list when accessing a higher privilege level from a port in...
Command Line Interface Guide
Page 81
... when a user logs in . • list-name - This has the same effect as the default list of all TACACS+ servers for authentication. NOTE: On the console, login succeeds without any authentication check if the authentication method is checked. Specify at least one from the following table: Keyword enable line local none...
... when a user logs in . • list-name - This has the same effect as the default list of all TACACS+ servers for authentication. NOTE: On the console, login succeeds without any authentication check if the authentication method is checked. Specify at least one from the following table: Keyword enable line local none...
Command Line Interface Guide
Page 82
... all methods return an error, specify none as the default list of methods, when using access higher privilege levels. (Range: 1 - 12 characters) • method1 [method2...] - Console(config)# aaa authentication login radius local none aaa authentication enable The aaa authentication enable Global Configuration mode command defines authentication method lists for authentication. Uses...
... all methods return an error, specify none as the default list of methods, when using access higher privilege levels. (Range: 1 - 12 characters) • method1 [method2...] - Console(config)# aaa authentication login radius local none aaa authentication enable The aaa authentication enable Global Configuration mode command defines authentication method lists for authentication. Uses...
Command Line Interface Guide
Page 83
...the enable authentication command. • The additional methods of authentication are used if it fails. AAA Commands 83 Console(config)# aaa authentication enable default enable login authentication The login authentication Line Configuration mode command specifies the login authentication method... list for authentication when accessing higher privilege levels. On the console, the enable password is used only if the previous method returns an error, not if it exists. Uses username ...
...the enable authentication command. • The additional methods of authentication are used if it fails. AAA Commands 83 Console(config)# aaa authentication enable default enable login authentication The login authentication Line Configuration mode command specifies the login authentication method... list for authentication when accessing higher privilege levels. On the console, the enable password is used only if the previous method returns an error, not if it exists. Uses username ...
Command Line Interface Guide
Page 84
Console(config)# line console Console(config-line)# login authentication default enable authentication The enable authentication Line Configuration mode command specifies the authentication method list when accessing a higher ... - Command Mode Line Configuration mode. Command Mode Line Configuration mode. 84 AAA Commands User Guidelines • Changing login authentication from a remote telnet or console. Default Configuration Uses the default set with the aaa authentication enable command. Uses the default list created with the aaa authentication enable command. Uses the...
Console(config)# line console Console(config-line)# login authentication default enable authentication The enable authentication Line Configuration mode command specifies the authentication method list when accessing a higher ... - Command Mode Line Configuration mode. Command Mode Line Configuration mode. 84 AAA Commands User Guidelines • Changing login authentication from a remote telnet or console. Default Configuration Uses the default set with the aaa authentication enable command. Uses the default list created with the aaa authentication enable command. Uses the...
Command Line Interface Guide
Page 85
Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for this command to return to ... none radius tacacs Description Uses the local username database for authentication. Use the no user guidelines for HTTP server users. Specify at least one from a console.
Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for this command to return to ... none radius tacacs Description Uses the local username database for authentication. Use the no user guidelines for HTTP server users. Specify at least one from a console.
Command Line Interface Guide
Page 86
.... Uses the list of this command to return to the default configuration. Example The following example configures the HTTP authentication. Console(config)# ip https authentication radius local 86 AAA Commands Console(config)# ip http authentication radius local ip https authentication The ip https authentication Global Configuration mode command specifies authentication methods for...
.... Uses the list of this command to return to the default configuration. Example The following example configures the HTTP authentication. Console(config)# ip https authentication radius local 86 AAA Commands Console(config)# ip http authentication radius local ip https authentication The ip https authentication Global Configuration mode command specifies authentication methods for...