Command Line Interface Guide
Page 29
...> enable Console# configure Console(config)# Using the CLI 29 For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following commands to service definitions. The crypto key pubkey-chain... ssh Global Configuration mode command is used to enter the SSH Public Key-chain Configuration mode. • QoS - The IPAL (IP-Access List Configuration) Mode Global Configuration mode command is very similar to manually...
...> enable Console# configure Console(config)# Using the CLI 29 For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following commands to service definitions. The crypto key pubkey-chain... ssh Global Configuration mode command is used to enter the SSH Public Key-chain Configuration mode. • QoS - The IPAL (IP-Access List Configuration) Mode Global Configuration mode command is very similar to manually...
Command Line Interface Guide
Page 30
...commands only. 30 Using the CLI The standard command to request help information can be displayed: • Keyword lookup - is the user's responsibility to ensure that the text copied into the device. The matched keyword or parameters for Telnet only. A list of a ... where help is a series of text (i.e., commands) can be copied and pasted into the device consists of a parameter. When a different user is manually entered. Editing Features Entering Commands A CLI command is the character ?. For example, in using the CLI, there is displayed. • Partial...
...commands only. 30 Using the CLI The standard command to request help information can be displayed: • Keyword lookup - is the user's responsibility to ensure that the text copied into the device. The matched keyword or parameters for Telnet only. A list of a ... where help is a series of text (i.e., commands) can be copied and pasted into the device consists of a parameter. When a different user is manually entered. Editing Features Entering Commands A CLI command is the character ?. For example, in using the CLI, there is displayed. • Partial...
Command Line Interface Guide
Page 53
...configuration. Enables public key authentication for incoming SSH sessions. Limits syslog messages displayed from a SSH server. Specifies which SSH public key is manually configured and enters the SSH public key-string configuration command. Limits messages logged to be configured from an internal buffer based on logging ...Group ip ssh port ip ssh server crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkeychain ssh user-key key-string show ip ssh show crypto key mypubkey show crypto key pubkey-chain ssh Description Specifies the port to the ...
...configuration. Enables public key authentication for incoming SSH sessions. Limits syslog messages displayed from a SSH server. Specifies which SSH public key is manually configured and enters the SSH public key-string configuration command. Limits messages logged to be configured from an internal buffer based on logging ...Group ip ssh port ip ssh server crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkeychain ssh user-key key-string show ip ssh show crypto key mypubkey show crypto key pubkey-chain ssh Description Specifies the port to the ...
Command Line Interface Guide
Page 69
...gvrp registration-forbid gvrp vlan-creation-forbid ip address ip address dhcp Adds a description to an Extensible Authentication Protocol (EAP) - Enables manual control of the authorization state of a given ethernet interface when not using auto-negotiation. request/identity frame, from the DHCP server.... Defines a guest VLAN. Enables unauthorized users on an 802.1x-authorized port, that the device sends an EAP request/identity frame to auto. Enables authentication based on ...
...gvrp registration-forbid gvrp vlan-creation-forbid ip address ip address dhcp Adds a description to an Extensible Authentication Protocol (EAP) - Enables manual control of the authorization state of a given ethernet interface when not using auto-negotiation. request/identity frame, from the DHCP server.... Defines a guest VLAN. Enables unauthorized users on an 802.1x-authorized port, that the device sends an EAP request/identity frame to auto. Enables authentication based on ...
Command Line Interface Guide
Page 74
dot1x re-authentication Manually initiates a re-authentication of the DHCP snooping binding file. show authentication methods Displays information about the CPU utilization of active processes. show cpu utilization Displays ... Displays all entries in all 802.1x-enabled ports or the specified 802.1x-enabled port. disable Returns to User EXEC mode. reload Reloads the operating system. set username active Reactivates a locked user account. set line active Reactivates a locked line. show bootvar Displays the active system image file that was suspended by...
dot1x re-authentication Manually initiates a re-authentication of the DHCP snooping binding file. show authentication methods Displays information about the CPU utilization of active processes. show cpu utilization Displays ... Displays all entries in all 802.1x-enabled ports or the specified 802.1x-enabled port. disable Returns to User EXEC mode. reload Reloads the operating system. set username active Reactivates a locked user account. set line active Reactivates a locked line. show bootvar Displays the active system image file that was suspended by...
Command Line Interface Guide
Page 76
Displays the configuration of the Simple Network Time Protocol (SNTP). Shows the configuration of SNMP users. Displays a list of SNMP views. SP (SSH Public Key) Mode Command Group key-string user-key Description Manually specifies a SSH public key. Displays Spanning Tree configuration. Displays the MAC-to a port. Displays the configuration of VLANs used internally...
Displays the configuration of the Simple Network Time Protocol (SNTP). Shows the configuration of SNMP users. Displays a list of SNMP views. SP (SSH Public Key) Mode Command Group key-string user-key Description Manually specifies a SSH public key. Displays Spanning Tree configuration. Displays the MAC-to a port. Displays the configuration of VLANs used internally...
Command Line Interface Guide
Page 125
... hh:mm:ss month day year • hh:mm:ss - Current day (by name (Jan, ..., Dec). • year - Command Mode Privileged EXEC mode. User Guidelines There are no default configuration. Current year (2000 - 2097). Syntax • clock set hh:mm:ss day month year or • clock set Privileged... EXEC mode command manually sets the system clock. Example The following example sets the system time to 13:32:00 on the 7th March 2002. Current time in the...
... hh:mm:ss month day year • hh:mm:ss - Current day (by name (Jan, ..., Dec). • year - Command Mode Privileged EXEC mode. User Guidelines There are no default configuration. Current year (2000 - 2097). Syntax • clock set hh:mm:ss day month year or • clock set Privileged... EXEC mode command manually sets the system clock. Example The following example sets the system time to 13:32:00 on the 7th March 2002. Current time in the...
Command Line Interface Guide
Page 127
.... (Range: first three letters by name, like Jan) • year - The acronym of the week (Range: first three letters by name, like sun) • date - User Guidelines • The system internally keeps time in UTC, so this command to configure the software not to automatically switch to add during summer time...:mm - Examples The following example sets the timezone to 6 hours difference from UTC. Day of the time zone to be displayed when summer time is manually set. Year - Time in military format, in hours and minutes. (Range: hh: 0 - 23, mm:0 - 59) • offset -
.... (Range: first three letters by name, like Jan) • year - The acronym of the week (Range: first three letters by name, like sun) • date - User Guidelines • The system internally keeps time in UTC, so this command to configure the software not to automatically switch to add during summer time...:mm - Examples The following example sets the timezone to 6 hours difference from UTC. Day of the time zone to be displayed when summer time is manually set. Year - Time in military format, in hours and minutes. (Range: hh: 0 - 23, mm:0 - 59) • offset -
Command Line Interface Guide
Page 168
... control. • off . Syntax • mdix {on | auto} • no form of this command to disable flow control. Manual mdix • auto - Command Mode Interface Configuration (Ethernet, port-channel) mode. Disables flow control. User Guidelines • Negotiation should be enabled for flow control auto. Console(config)# interface ethernet 1/e5 Console(config-if...
... control. • off . Syntax • mdix {on | auto} • no form of this command to disable flow control. Manual mdix • auto - Command Mode Interface Configuration (Ethernet, port-channel) mode. Disables flow control. User Guidelines • Negotiation should be enabled for flow control auto. Console(config)# interface ethernet 1/e5 Console(config-if...
Command Line Interface Guide
Page 183
... for the network, and all desired VLANs for this command to disable GVRP on the device. User Guidelines There are no form of this command to device. GVRP Commands 183 Syntax • gvrp enable • no form of this command. Console(config)# ... industry-standard protocol designed to propagate VLAN information from device to disable GVRP on an interface. Use the no gvrp enable Default Configuration GVRP is manually configured with all other devices on the network learn these VLANs dynamically.
... for the network, and all desired VLANs for this command to disable GVRP on the device. User Guidelines There are no form of this command to device. GVRP Commands 183 Syntax • gvrp enable • no form of this command. Console(config)# ... industry-standard protocol designed to propagate VLAN information from device to disable GVRP on an interface. Use the no gvrp enable Default Configuration GVRP is manually configured with all other devices on the network learn these VLANs dynamically.
Command Line Interface Guide
Page 184
..., leave and leaveall timers of timer. • timer_value - Use the no garp timer • {join | leave | leaveall} - That is, the PVID is manually defined as in a tagged VLAN. User Guidelines • An access port does not dynamically join a VLAN because it is always a member in only one VLAN. • Membership in an...
..., leave and leaveall timers of timer. • timer_value - Use the no garp timer • {join | leave | leaveall} - That is, the PVID is manually defined as in a tagged VLAN. User Guidelines • An access port does not dynamically join a VLAN because it is always a member in only one VLAN. • Membership in an...
Command Line Interface Guide
Page 216
...the low order 64 bits of the address). Specifies to the interface. Default Configuration No IP address is defined for an interface. User Guidelines • If the value specified for a range of the IPv6 prefix. The length of interfaces (range context). Cannot be ...mode. Syntax • ipv6 address ipv6-address/prefix-length [eui-64] [anycast] • no ipv6 address command without arguments removes all manually configured IPv6 addresses from the interface. Example The following example displays the IPv6 ICMP error interval setting.. Console> show ipv6 icmp error-interval ...
...the low order 64 bits of the address). Specifies to the interface. Default Configuration No IP address is defined for an interface. User Guidelines • If the value specified for a range of the IPv6 prefix. The length of interfaces (range context). Cannot be ...mode. Syntax • ipv6 address ipv6-address/prefix-length [eui-64] [anycast] • no ipv6 address command without arguments removes all manually configured IPv6 addresses from the interface. Example The following example displays the IPv6 ICMP error interval setting.. Console> show ipv6 icmp error-interval ...
Command Line Interface Guide
Page 217
... is FE80::EUI64 (interface MAC address). Link local address of the interface is specified in hexadecimal using 16-bit values between colons. User Guidelines • Using the no ipv6 link-local address command is used, the interface is reconfigured with the standard link local address ...is set automatically when the enable ipv6 command is enabled on the interface. When the no ipv6 link-local address command removes the manually configured link local IPv6 address from an interface. IPv6 Addressing 217 Command Mode Interface configuration (Ethernet, VLAN, Port-channel). Multiple IPv6...
... is FE80::EUI64 (interface MAC address). Link local address of the interface is specified in hexadecimal using 16-bit values between colons. User Guidelines • Using the no ipv6 link-local address command is used, the interface is reconfigured with the standard link local address ...is set automatically when the enable ipv6 command is enabled on the interface. When the no ipv6 link-local address command removes the manually configured link local IPv6 address from an interface. IPv6 Addressing 217 Command Mode Interface configuration (Ethernet, VLAN, Port-channel). Multiple IPv6...
Command Line Interface Guide
Page 394
.... Command Mode Global Configuration mode. User Guidelines AAA authentication is independent Example The following example enables public key authentication for incoming SSH sessions is used to manually specify other device public keys such as SSH client public keys. User Guidelines There are specified. Syntax ...8226; crypto key pubkey-chain ssh Default Configuration No keys are no user guidelines for this command. 394 SSH ...
.... Command Mode Global Configuration mode. User Guidelines AAA authentication is independent Example The following example enables public key authentication for incoming SSH sessions is used to manually specify other device public keys such as SSH client public keys. User Guidelines There are specified. Syntax ...8226; crypto key pubkey-chain ssh Default Configuration No keys are no user guidelines for this command. 394 SSH ...
Command Line Interface Guide
Page 395
... Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9 user-key The user-key SSH Public Key-string Configuration mode command specifies which SSH public key is manually configured. Indicates the DSA key pair. Indicates the RSA key pair. • dsa - Example The following... example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob. SSH Commands 395 Syntax • user-key username {rsa | dsa} • no form of the remote SSH client. (Range: 1-48 characters) •...
... Fingerprint: a4:16:46:23:5a:8d:1d:b5:37:59:eb:44:13:b9:33:e9 user-key The user-key SSH Public Key-string Configuration mode command specifies which SSH public key is manually configured. Indicates the DSA key pair. Indicates the RSA key pair. • dsa - Example The following... example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob. SSH Commands 395 Syntax • user-key username {rsa | dsa} • no form of the remote SSH client. (Range: 1-48 characters) •...
Command Line Interface Guide
Page 396
...manually configuring an SSH public key for SSH public key-chain bob. UU-encoded DER format is the same format in UU-encoded DER format; Command Mode SSH Public Key-string Configuration mode. 396 SSH Commands Default Configuration No keys exist. Default Configuration No SSH public keys exist. User...Console(config-pubkey-key)# key-string row AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl key-string The key-string SSH Public Key-string Configuration mode command manually specifies an SSH public key. Indicates the SSH public key row by OpenSSH. Specifies the key in the authorized_keys ...
...manually configuring an SSH public key for SSH public key-chain bob. UU-encoded DER format is the same format in UU-encoded DER format; Command Mode SSH Public Key-string Configuration mode. 396 SSH Commands Default Configuration No keys exist. Default Configuration No SSH public keys exist. User...Console(config-pubkey-key)# key-string row AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl key-string The key-string SSH Public Key-string Configuration mode command manually specifies an SSH public key. Indicates the SSH public key row by OpenSSH. Specifies the key in the authorized_keys ...
Command Line Interface Guide
Page 516
... Configuration mode command enables 802.1x globally. Console(config)# dot1x system-auth-control dot1x port-control The dot1x port-control Interface Configuration mode command enables manually controlling the authorization state of this command. Examples The following example enables 802.1x globally. Examples The following example uses the aaa authentication dot1x default...
... Configuration mode command enables 802.1x globally. Console(config)# dot1x system-auth-control dot1x port-control The dot1x port-control Interface Configuration mode command enables manually controlling the authorization state of this command. Examples The following example enables 802.1x globally. Examples The following example uses the aaa authentication dot1x default...
Command Line Interface Guide
Page 519
...configuration. Command Mode Privileged EXEC mode. Syntax • dot1x re-authenticate [ethernet interface] • interface - Use the no user guidelines for example, the client provided an invalid password). Examples The following example sets the number of seconds between re-authentication ...syntax: unit/port) Default Configuration This command has no dot1x timeout quiet-period 802.1x Commands 519 Examples The following command manually initiates a re-authentication of 802.1X-enabled Ethernet port 1/e16. Console# dot1x re-authenticate ethernet 1/e16 dot1x timeout quiet-...
...configuration. Command Mode Privileged EXEC mode. Syntax • dot1x re-authenticate [ethernet interface] • interface - Use the no user guidelines for example, the client provided an invalid password). Examples The following example sets the number of seconds between re-authentication ...syntax: unit/port) Default Configuration This command has no dot1x timeout quiet-period 802.1x Commands 519 Examples The following command manually initiates a re-authentication of 802.1X-enabled Ethernet port 1/e16. Console# dot1x re-authenticate ethernet 1/e16 dot1x timeout quiet-...
User's Guide
Page 14
... user selects a different Unit ID, it is elected as the Master. • If two Master enabled stacking members are present, and one has been manually configured as the Stack Master, the manually configured member is elected as Stack Master. • If two Master enabled units are present and neither has been manually configured...the one with the longer up-time is elected as the Stack Master. • If two Master enabled units are present and both have been manually configured as the Master, the one Stack Master enabled unit is present, it is not erased, and remains valid, even if the unit is...
... user selects a different Unit ID, it is elected as the Master. • If two Master enabled stacking members are present, and one has been manually configured as the Stack Master, the manually configured member is elected as Stack Master. • If two Master enabled units are present and neither has been manually configured...the one with the longer up-time is elected as the Stack Master. • If two Master enabled units are present and both have been manually configured as the Master, the one Stack Master enabled unit is present, it is not erased, and remains valid, even if the unit is...
User's Guide
Page 19
... the Bridging Table, as an alternative to learning them from incoming frames. These user-defined entries are not subject to configure the port speeds that the quality of voice... The device enables controlled MAC address learning from overflowing. Network Administrators can be manually entered in the source MAC address. The device reserves specific MAC addresses for MAC...the Guest VLAN is forwarded. This prevents the Bridging Table from incoming packets. The PowerConnect 35xx series systems enhances auto negotiation by configuring ports to VoIP, ensuring that are preserved...
... the Bridging Table, as an alternative to learning them from incoming frames. These user-defined entries are not subject to configure the port speeds that the quality of voice... The device enables controlled MAC address learning from overflowing. Network Administrators can be manually entered in the source MAC address. The device reserves specific MAC addresses for MAC...the Guest VLAN is forwarded. This prevents the Bridging Table from incoming packets. The PowerConnect 35xx series systems enhances auto negotiation by configuring ports to VoIP, ensuring that are preserved...