Command Line Interface Guide
Page 20
... tacacs-server host 435 tacacs-server key 436 tacacs-server timeout 437 tacacs-server source-ip 437 show tacacs 438 33 TIC Commands 441 passwords min-length 441 password-aging 442 passwords aging 442 passwords history 443 passwords history hold-time 444 passwords lockout 445 ...aaa login-history file 446 set username active 446 set line active 447 set enable-password active 447 show passwords configuration 448 show users login-history 450 show users accounts 451 34 Tunnel 453 ...
... tacacs-server host 435 tacacs-server key 436 tacacs-server timeout 437 tacacs-server source-ip 437 show tacacs 438 33 TIC Commands 441 passwords min-length 441 password-aging 442 passwords aging 442 passwords history 443 passwords history hold-time 444 passwords lockout 445 ...aaa login-history file 446 set username active 446 set line active 447 set enable-password active 447 show passwords configuration 448 show users login-history 450 show users accounts 451 34 Tunnel 453 ...
Command Line Interface Guide
Page 25
...commands available for that particular command mode. From each mode a specific command is divided into different command modes. The following figure illustrates the command mode access path. CLI Command Modes Introduction To assist in using the CLI. The standard order to assist in configuring the device, the Command Line... Interface (CLI) is used to navigate from one command mode to another. Entering a question mark "?" Using the CLI 25 at the system prompt (console prompt) displays a list of specific commands. Using the CLI This ...
...commands available for that particular command mode. From each mode a specific command is divided into different command modes. The following figure illustrates the command mode access path. CLI Command Modes Introduction To assist in using the CLI. The standard order to assist in configuring the device, the Command Line... Interface (CLI) is used to navigate from one command mode to another. Entering a question mark "?" Using the CLI 25 at the system prompt (console prompt) displays a list of specific commands. Using the CLI This ...
Command Line Interface Guide
Page 28
... the Port Channel Interface Configuration mode. 28 Using the CLI The Line Commands Global Configuration mode is used to create a VLAN as line timeout settings, etc. Contains commands to enter the Line Configuration command mode. • VLAN Database - The interface ethernet Global Configuration mode command is used to enter the Interface Configuration mode to the Privileged EXEC...
... the Port Channel Interface Configuration mode. 28 Using the CLI The Line Commands Global Configuration mode is used to create a VLAN as line timeout settings, etc. Contains commands to enter the Line Configuration command mode. • VLAN Database - The interface ethernet Global Configuration mode command is used to enter the Interface Configuration mode to the Privileged EXEC...
Command Line Interface Guide
Page 29
...29 • SSH Public Key-chain - Contains commands to service definitions. The IPAL (IP-Access List Configuration) Mode Global Configuration mode command is installed. Using the device command-line interface (CLI) is via a Telnet connection. NOTE: The following commands to www.microsoft.com for use on MAC ...command is used to entering commands on Windows 2000 service packs. Starting the CLI The device can be managed over cable to the RS-232 serial port of the device to allow traffic based on the console line only. For more information, see Dell™ PowerConnect...
...29 • SSH Public Key-chain - Contains commands to service definitions. The IPAL (IP-Access List Configuration) Mode Global Configuration mode command is installed. Using the device command-line interface (CLI) is via a Telnet connection. NOTE: The following commands to www.microsoft.com for use on MAC ...command is used to entering commands on Windows 2000 service packs. Starting the CLI The device can be managed over cable to the RS-232 serial port of the device to allow traffic based on the console line only. For more information, see Dell™ PowerConnect...
Command Line Interface Guide
Page 30
... ensure that require parameters, enter the required parameters after the command keyword. NOTE: It is an assortment of a parameter. To see what commands are described: • Terminal Command Buffer • Command Completion • Keyboard Shortcuts Copying and Pasting Text Up to 100 lines of legal commands only. 30 Using the CLI NOTE: This editing features are...
... ensure that require parameters, enter the required parameters after the command keyword. NOTE: It is an assortment of a parameter. To see what commands are described: • Terminal Command Buffer • Command Completion • Keyboard Shortcuts Copying and Pasting Text Up to 100 lines of legal commands only. 30 Using the CLI NOTE: This editing features are...
Command Line Interface Guide
Page 32
Returns back to the Privileged EXEC mode from the history buffer after recalling commands with the most recent commands from any configuration mode. The following table describes the CLI shortcuts. In a command line, curly brackets indicate a selection of the command line. Indicates a parameter. For example, the command interface range port-channel has the option of either auto, on...
Returns back to the Privileged EXEC mode from the history buffer after recalling commands with the most recent commands from any configuration mode. The following table describes the CLI shortcuts. In a command line, curly brackets indicate a selection of the command line. Indicates a parameter. For example, the command interface range port-channel has the option of either auto, on...
Command Line Interface Guide
Page 33
Refer to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. You can be completed before using a terminal keyboard and the ... Configuration and Image Files Commands Manages the device configuration files. By directly entering commands, you enter commands using this document. you achieve greater configuration flexibility. ACL Commands Configures ACL on the device. Clock Commands Configures clock commands on the device. This guide describes how the Command Line Interface (CLI) is ...
Refer to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. You can be completed before using a terminal keyboard and the ... Configuration and Image Files Commands Manages the device configuration files. By directly entering commands, you enter commands using this document. you achieve greater configuration flexibility. ACL Commands Configures ACL on the device. Clock Commands Configures clock commands on the device. This guide describes how the Command Line Interface (CLI) is ...
Command Line Interface Guide
Page 34
Ethernet Configuration GVRP Commands IGMP Snooping Commands IP Addressing Commands IPv6 Addressing Commands LACP Commands Line Commands LLDP Commands Login Banner Commands Management ACL Commands PHY Diagnostics Commands Power-over Ethernet setings on Spanning Tree protocol. Configures and displays LACP information. Cofigures customizable login banners on the device. Configures Web based access to ...
Ethernet Configuration GVRP Commands IGMP Snooping Commands IP Addressing Commands IPv6 Addressing Commands LACP Commands Line Commands LLDP Commands Login Banner Commands Management ACL Commands PHY Diagnostics Commands Power-over Ethernet setings on Spanning Tree protocol. Configures and displays LACP information. Cofigures customizable login banners on the device. Configures Web based access to ...
Command Line Interface Guide
Page 82
...following example configures the authentication login, so that the authentication algorithm tries, in the command line. If there is no database, then no form of this command to return to the default configuration. Uses the listed authentication methods that the authentication... • aaa authentication enable {default | list-name} method1 [method2...] • no authentication. 82 AAA Commands Example The following table: Keyword enable line none Description Uses the enable password for accessing higher privilege levels. If the RADIUS server is not available, authentication...
...following example configures the authentication login, so that the authentication algorithm tries, in the command line. If there is no database, then no form of this command to return to the default configuration. Uses the listed authentication methods that the authentication... • aaa authentication enable {default | list-name} method1 [method2...] • no authentication. 82 AAA Commands Example The following table: Keyword enable line none Description Uses the enable password for accessing higher privilege levels. If the RADIUS server is not available, authentication...
Command Line Interface Guide
Page 83
...; The additional methods of authentication are used if it fails. Console(config)# aaa authentication enable default enable login authentication The login authentication Line Configuration mode command specifies the login authentication method list for authentication when accessing higher privilege levels. Uses username $enabx$., where x is set , only the.... To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. • All aaa authentication enable default requests sent by the aaa authentication login...
...; The additional methods of authentication are used if it fails. Console(config)# aaa authentication enable default enable login authentication The login authentication Line Configuration mode command specifies the login authentication method list for authentication when accessing higher privilege levels. Uses username $enabx$., where x is set , only the.... To ensure that the authentication succeeds even if all methods return an error, specify none as the final method in the command line. • All aaa authentication enable default requests sent by the aaa authentication login...
Command Line Interface Guide
Page 85
... method1 [method2...] - Uses the list of all TACACS+ servers for authentication. This has the same effect as the final method in the command line. AAA Commands 85 Syntax • ip http authentication method1 [method2...] • no authentication. Specify at least one from a console. Uses the list ...of all methods return an error, specify none as the command ip http authentication local. User Guidelines There are used only if the previous method returns an error, not if it fails. Use the...
... method1 [method2...] - Uses the list of all TACACS+ servers for authentication. This has the same effect as the final method in the command line. AAA Commands 85 Syntax • ip http authentication method1 [method2...] • no authentication. Specify at least one from a console. Uses the list ...of all methods return an error, specify none as the command ip http authentication local. User Guidelines There are used only if the previous method returns an error, not if it fails. Use the...
Command Line Interface Guide
Page 86
...method1 [method2...] - This has the same effect as the final method in the command line. Command Mode Global Configuration mode. Console(config)# ip https authentication radius local 86 AAA Commands Syntax • ip https authentication method1 [method2...] • no authentication. Default...authentication. Console(config)# ip http authentication radius local ip https authentication The ip https authentication Global Configuration mode command specifies authentication methods for authentication. Uses the list of authentication are used only if the previous method returns...
...method1 [method2...] - This has the same effect as the final method in the command line. Command Mode Global Configuration mode. Console(config)# ip https authentication radius local 86 AAA Commands Syntax • ip https authentication method1 [method2...] • no authentication. Default...authentication. Console(config)# ip http authentication radius local ip https authentication The ip https authentication Global Configuration mode command specifies authentication methods for authentication. Uses the list of authentication are used only if the previous method returns...
Command Line Interface Guide
Page 143
... configuration'. Loading file1 from a network server to the device 'running configuration'. The configuration file copy can serve as if the commands were typed in the command-line interface (CLI). The configuration is a combination of 172.16.101.101 to non active image file. Use the copy source-url... running-config command to load a 'configuration file' from 172.16.101.101 OK] Copy took 0:01:11 [hh:mm:ss] Configuration and ...
... configuration'. Loading file1 from a network server to the device 'running configuration'. The configuration file copy can serve as if the commands were typed in the command-line interface (CLI). The configuration is a combination of 172.16.101.101 to non active image file. Use the copy source-url... running-config command to load a 'configuration file' from 172.16.101.101 OK] Copy took 0:01:11 [hh:mm:ss] Configuration and ...
Command Line Interface Guide
Page 237
...(config)# line telnet Console(config-line)# Line Commands 237 Syntax • line {console | telnet | ssh} • console - Default Configuration This command has no user guidelines for this command. Virtual terminal for secured remote console access (SSH). Virtual terminal for remote console access (Telnet). • ssh - Command Mode Global Configuration mode. Line Commands line The line Global Configuration mode command identifies a specific line for remote...
...(config)# line telnet Console(config-line)# Line Commands 237 Syntax • line {console | telnet | ssh} • console - Default Configuration This command has no user guidelines for this command. Virtual terminal for secured remote console access (SSH). Virtual terminal for remote console access (Telnet). • ssh - Command Mode Global Configuration mode. Line Commands line The line Global Configuration mode command identifies a specific line for remote...
Command Line Interface Guide
Page 342
...of 123400000000000000000000, you have to indicate the MAC address that is generated using this command, and the default is specified, the default engine ID is recommended: - A user's password (entered on the command line) is based on the device. For a standalone device, use SNMPv3, you...of all 0x0, all 0xF or 0x000000001. • The show running-config Privileged EXEC mode command does not display the SNMP engine ID configuration. The user's command line password is erased, SNMPv3 cannot be unique within an administrative domain, the following important side-effect...
...of 123400000000000000000000, you have to indicate the MAC address that is generated using this command, and the default is specified, the default engine ID is recommended: - A user's password (entered on the command line) is based on the device. For a standalone device, use SNMPv3, you...of all 0x0, all 0xF or 0x000000001. • The show running-config Privileged EXEC mode command does not display the SNMP engine ID configuration. The user's command line password is erased, SNMPv3 cannot be unique within an administrative domain, the following important side-effect...
Command Line Interface Guide
Page 515
...the following table: Keyword Radius None Description Uses the list of all methods return an error, specify none as the final method in the command line. • The RADIUS server must support MD-5 challenge and EAP type frames. • The device accepts EAP frames with a priority ...tag and also accepts EAP packets with VLAN tags. 802.1x Commands 515 Syntax • aaa authentication dot1x default method1 [method2...] • no form of this command to return to the default configuration. To ensure that authentication succeeds even if all RADIUS servers...
...the following table: Keyword Radius None Description Uses the list of all methods return an error, specify none as the final method in the command line. • The RADIUS server must support MD-5 challenge and EAP type frames. • The device accepts EAP frames with a priority ...tag and also accepts EAP packets with VLAN tags. 802.1x Commands 515 Syntax • aaa authentication dot1x default method1 [method2...] • no form of this command to return to the default configuration. To ensure that authentication succeeds even if all RADIUS servers...
User's Guide
Page 12
... impact in a stand-alone device, or as stacking ports when the device is stacked. PowerConnect 3548 and PowerConnect 3548P Stacking Overview PowerConnect 3524/P and PowerConnect 3548/P stacking provides multiple switch management through which can be used to forward traffic in the...a stack. PowerConnect 3548 The PowerConnect 3548 provides 48 10/100Mbps ports plus two SFP ports, and two Copper ports which the stack is managed from a: • Web-based interface • SNMP Management Station • Command Line Interface (CLI) PowerConnect 3524/P and PowerConnect 3548/P devices...
... impact in a stand-alone device, or as stacking ports when the device is stacked. PowerConnect 3548 and PowerConnect 3548P Stacking Overview PowerConnect 3524/P and PowerConnect 3548/P stacking provides multiple switch management through which can be used to forward traffic in the...a stack. PowerConnect 3548 The PowerConnect 3548 provides 48 10/100Mbps ports plus two SFP ports, and two Copper ports which the stack is managed from a: • Web-based interface • SNMP Management Station • Command Line Interface (CLI) PowerConnect 3524/P and PowerConnect 3548/P devices...
User's Guide
Page 24
...IP address. DNS servers maintain domain name databases and their corresponding IP addresses. For more information, see "Viewing Statistics." Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as opposed to be executed from the reference clock. The higher the... File Transfer Protocol The device supports boot image, software, and configuration upload/download via TFTP. The CLI interpreter provides command and keyword completion to 192.87.56.2. Time sources are established by a network SNTP server. Traceroute Traceroute discovers IP...
...IP address. DNS servers maintain domain name databases and their corresponding IP addresses. For more information, see "Viewing Statistics." Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as opposed to be executed from the reference clock. The higher the... File Transfer Protocol The device supports boot image, software, and configuration upload/download via TFTP. The CLI interpreter provides command and keyword completion to 192.87.56.2. Time sources are established by a network SNTP server. Traceroute Traceroute discovers IP...
User's Guide
Page 455
... from any device within a designated set of a control unit and an ALU. CPUs are protocol independent. Bridges are hardware specific, however they are composed of line commands used , and the session is the 802.1p priority scheme. Broadcasting A method of two or more information about broadcast storms, see Using the CLI. A overlapping..., see "Defining LAG Parameters" on page 304. Class of Service Class of Service is restarted. CoS provides a method for tagging packets with priority information. CLI Command Line Interface.
... from any device within a designated set of a control unit and an ALU. CPUs are protocol independent. Bridges are hardware specific, however they are composed of line commands used , and the session is the 802.1p priority scheme. Broadcasting A method of two or more information about broadcast storms, see Using the CLI. A overlapping..., see "Defining LAG Parameters" on page 304. Class of Service Class of Service is restarted. CoS provides a method for tagging packets with priority information. CLI Command Line Interface.
User's Guide
Page 471
... Protocol Data Unit, 454 Broadcast, 102, 104 Buttons, 72 C Cables, 165, 167 CBC, 219 CIDR, 455 Cipher Block-Chaining, 219 CLI, 12, 24 Command Line Interface, 12, 24 Command Mode Overview, 74 Communities, 234 Configuration file, 248 Console, 116 CoS, 445 Critical, 114, 116 D Debug, 114, 116 Default Gateway, 129-130 Default Gateway...
... Protocol Data Unit, 454 Broadcast, 102, 104 Buttons, 72 C Cables, 165, 167 CBC, 219 CIDR, 455 Cipher Block-Chaining, 219 CLI, 12, 24 Command Line Interface, 12, 24 Command Mode Overview, 74 Communities, 234 Configuration file, 248 Console, 116 CoS, 445 Critical, 114, 116 D Debug, 114, 116 Default Gateway, 129-130 Default Gateway...