Command Line Interface Guide
Page 29
...MAC addresses. CAUTION: When using HyperTerminal with Microsoft® Windows 2000, ensure that the setting is connected to the device prior to manually specify other device SSH public keys. To start using CLI commands. c Under Properties, select VT100 for Function, Arrow, and Ctrl ... mode. Ensure that Windows® 2000 Service Pack 2 or later is via a Telnet connection. For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps are for Ryan, is granted, and the workstation used to www.microsoft.com for Terminal...
...MAC addresses. CAUTION: When using HyperTerminal with Microsoft® Windows 2000, ensure that the setting is connected to the device prior to manually specify other device SSH public keys. To start using CLI commands. c Under Properties, select VT100 for Function, Arrow, and Ctrl ... mode. Ensure that Windows® 2000 Service Pack 2 or later is via a Telnet connection. For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps are for Ryan, is granted, and the workstation used to www.microsoft.com for Terminal...
Command Line Interface Guide
Page 30
...is entered in place of a parameter. The character ? is manually entered. The following features are two instances where help information can be displayed: • Keyword lookup - This effectively logs off the current user and logs on the new user. There are described: • Terminal Command Buffer • ...complete the required tasks. 4 When finished, exit the session with the CLI, the command options are for Telnet only. When a different user is an argument that specifies the interface type, and 1/e11 specifies the port. NOTE: It is the character ?. For example, in ...
...is entered in place of a parameter. The character ? is manually entered. The following features are two instances where help information can be displayed: • Keyword lookup - This effectively logs off the current user and logs on the new user. There are described: • Terminal Command Buffer • ...complete the required tasks. 4 When finished, exit the session with the CLI, the command options are for Telnet only. When a different user is an argument that specifies the interface type, and 1/e11 specifies the port. NOTE: It is the character ?. For example, in ...
Command Line Interface Guide
Page 53
... ip ssh port ip ssh server crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkeychain ssh user-key key-string show ip ssh show crypto key mypubkey show crypto key pubkey-chain ssh Description Specifies the port to be ...an internal buffer based on the device. Generates DSA key pairs. Access Mode Global Configuration Global Configuration Global Configuration Global Configuration Command Groups 53 Manually specifies a SSH public key. Limits syslog messages displayed from a SSH server. Enters SSH Public Key-chain configuration mode. Enables public key ...
... ip ssh port ip ssh server crypto key generate dsa crypto key generate rsa ip ssh pubkey-auth crypto key pubkeychain ssh user-key key-string show ip ssh show crypto key mypubkey show crypto key pubkey-chain ssh Description Specifies the port to be ...an internal buffer based on the device. Generates DSA key pairs. Access Mode Global Configuration Global Configuration Global Configuration Global Configuration Command Groups 53 Manually specifies a SSH public key. Limits syslog messages displayed from a SSH server. Enters SSH Public Key-chain configuration mode. Enables public key ...
Command Line Interface Guide
Page 69
...device sends an EAP request/identity frame to an Extensible Authentication Protocol (EAP) - Enables periodic re-authentication of the port Enables user-based VLAN assignment. Sets the time for the retransmission of an EAP-request frame to the authentication server. request/identity frame, from... the DHCP server. Allows multiple hosts (clients) on the station's MAC address. Enables manual control of the authorization state of the client. Sets the number of packets to the client. Configures the full/half duplex operation of...
...device sends an EAP request/identity frame to an Extensible Authentication Protocol (EAP) - Enables periodic re-authentication of the port Enables user-based VLAN assignment. Sets the time for the retransmission of an EAP-request frame to the authentication server. request/identity frame, from... the DHCP server. Allows multiple hosts (clients) on the station's MAC address. Enables manual control of the authorization state of the client. Sets the number of packets to the client. Configures the full/half duplex operation of...
Command Line Interface Guide
Page 74
more Displays a file. set username active Reactivates a locked user account. set enable-password active Reactivates a locked local password. show dot1x Displays 802.1x status for the device or for the specified interface. 74 Command ... terminal session by the system. show bridge address-table Displays all 802.1x-enabled ports or the specified 802.1x-enabled port. dot1x re-authentication Manually initiates a re-authentication of the DHCP snooping binding file. disable Returns to User EXEC mode. table show bridge multicast address-
more Displays a file. set username active Reactivates a locked user account. set enable-password active Reactivates a locked local password. show dot1x Displays 802.1x status for the device or for the specified interface. 74 Command ... terminal session by the system. show bridge address-table Displays all 802.1x-enabled ports or the specified 802.1x-enabled port. dot1x re-authentication Manually initiates a re-authentication of the DHCP snooping binding file. disable Returns to User EXEC mode. table show bridge multicast address-
Command Line Interface Guide
Page 76
...the startup configuration file contents. SP (SSH Public Key) Mode Command Group key-string user-key Description Manually specifies a SSH public key. show snmp filters show snmp groups show snmp users show snmp views show sntp configuration show sntp status show spanning-tree show startup-config ...show syslog-servers show tacacs show users accounts show users login-history show vlan show vlan ...
...the startup configuration file contents. SP (SSH Public Key) Mode Command Group key-string user-key Description Manually specifies a SSH public key. show snmp filters show snmp groups show snmp users show snmp views show sntp configuration show sntp status show spanning-tree show startup-config ...show syslog-servers show tacacs show users accounts show users login-history show vlan show vlan ...
Command Line Interface Guide
Page 125
... 7th March 2002. Clock clock set The clock set hh:mm:ss month day year • hh:mm:ss - Default Configuration This command has no user guidelines for this command. Syntax • clock set hh:mm:ss day month year or • clock set Privileged EXEC mode command... manually sets the system clock. Current day (by name (Jan, ..., Dec). • year - Command Mode Privileged EXEC mode. Current year (2000 - 2097). Console# clock set 13:...
... 7th March 2002. Clock clock set The clock set hh:mm:ss month day year • hh:mm:ss - Default Configuration This command has no user guidelines for this command. Syntax • clock set hh:mm:ss day month year or • clock set Privileged EXEC mode command... manually sets the system clock. Current day (by name (Jan, ..., Dec). • year - Command Mode Privileged EXEC mode. Current year (2000 - 2097). Console# clock set 13:...
Command Line Interface Guide
Page 127
... start and end on the second specific date in the command. • usa - Week of the time zone to be displayed when summer time is manually set. Use the no form of minutes to add during summer time. (Range: 1 - 1440) • acronym - The summer time rules are the...] [zone acronym] • no abbreviation (Range: 2000 - 2097) • hh:mm - Month. (Range: first three letters by name, like Jan) • year - User Guidelines • The system internally keeps time in UTC, so this command to configure the software not to automatically switch to summer time. Examples The...
... start and end on the second specific date in the command. • usa - Week of the time zone to be displayed when summer time is manually set. Use the no form of minutes to add during summer time. (Range: 1 - 1440) • acronym - The summer time rules are the...] [zone acronym] • no abbreviation (Range: 2000 - 2097) • hh:mm - Month. (Range: first three letters by name, like Jan) • year - User Guidelines • The system internally keeps time in UTC, so this command to configure the software not to automatically switch to summer time. Examples The...
Command Line Interface Guide
Page 168
... (Ethernet, port-channel) mode. Use the no form of this command to disable cable crossover. Indicates auto-negotiation • on a given interface. User Guidelines • Negotiation should be enabled for flow control auto. Syntax • mdix {on - Syntax • flowcontrol {auto | on | off} ...e5 Console(config-if)# flowcontrol on mdix The mdix Interface Configuration (Ethernet) mode command enables cable crossover on port 1/e5. Manual mdix • auto - Default Configuration Flow control is off - Use the no form of this command to disable flow control. Disables ...
... (Ethernet, port-channel) mode. Use the no form of this command to disable cable crossover. Indicates auto-negotiation • on a given interface. User Guidelines • Negotiation should be enabled for flow control auto. Syntax • mdix {on - Syntax • flowcontrol {auto | on | off} ...e5 Console(config-if)# flowcontrol on mdix The mdix Interface Configuration (Ethernet) mode command enables cable crossover on port 1/e5. Manual mdix • auto - Default Configuration Flow control is off - Use the no form of this command to disable flow control. Disables ...
Command Line Interface Guide
Page 183
... from device to disable GVRP on an interface. Syntax • gvrp enable • no user guidelines for the network, and all desired VLANs for this command. User Guidelines There are no gvrp enable Default Configuration GVRP is manually configured with all other devices on the device. Example The following example enables GVRP globally...
... from device to disable GVRP on an interface. Syntax • gvrp enable • no user guidelines for the network, and all desired VLANs for this command. User Guidelines There are no gvrp enable Default Configuration GVRP is manually configured with all other devices on the device. Example The following example enables GVRP globally...
Command Line Interface Guide
Page 184
...the join, leave and leaveall timers of timer. • timer_value - Use the no gvrp enable Default Configuration GVRP is disabled on Ethernet port 1/e6. User Guidelines • An access port does not dynamically join a VLAN because it is always a member in only one VLAN. • Membership in an... untagged VLAN is manually defined as in a tagged VLAN. That is, the PVID is propagated in multiples of 10. (Range: 10 - 2147483647) Default Configuration Following are the ...
...the join, leave and leaveall timers of timer. • timer_value - Use the no gvrp enable Default Configuration GVRP is disabled on Ethernet port 1/e6. User Guidelines • An access port does not dynamically join a VLAN because it is always a member in only one VLAN. • Membership in an... untagged VLAN is manually defined as in a tagged VLAN. That is, the PVID is propagated in multiples of 10. (Range: 10 - 2147483647) Default Configuration Following are the ...
Command Line Interface Guide
Page 216
...only 64 when the eui-64 parameter is defined for the /prefix-length argument is specified in the low order 64 bits of the address). User Guidelines • If the value specified for the interface. The address is greater than 64 bits, the prefix bits have precedence over the ...interface ID. • Using the no ipv6 address command without arguments removes all manually configured IPv6 addresses from the interface. Console> show ipv6 icmp error-interval Rate limit interval: 100 ms Bucket size: 10 tokens ipv6 address The...
...only 64 when the eui-64 parameter is defined for the /prefix-length argument is specified in the low order 64 bits of the address). User Guidelines • If the value specified for the interface. The address is greater than 64 bits, the prefix bits have precedence over the ...interface ID. • Using the no ipv6 address command without arguments removes all manually configured IPv6 addresses from the interface. Console> show ipv6 icmp error-interval Rate limit interval: 100 ms Bucket size: 10 tokens ipv6 address The...
Command Line Interface Guide
Page 217
...command configures an IPv6 link-local address for a range of interfaces (range context). Use the no ipv6 link-local address command removes the manually configured link local IPv6 address from an interface. The system supports only 64 bits prefix length for interface g1. The IPv6 network address ...assigned to be configured per interface, but only one link-local address. User Guidelines • Using the no form of the interface is used , the interface is reconfigured with the standard link local address (the ...
...command configures an IPv6 link-local address for a range of interfaces (range context). Use the no ipv6 link-local address command removes the manually configured link local IPv6 address from an interface. The system supports only 64 bits prefix length for interface g1. The IPv6 network address ...assigned to be configured per interface, but only one link-local address. User Guidelines • Using the no form of the interface is used , the interface is reconfigured with the standard link local address (the ...
Command Line Interface Guide
Page 394
... authentication for incoming SSH sessions is independent Example The following example enables public key authentication for this command. 394 SSH Commands User Guidelines There are specified. The mode is used to manually specify other device public keys such as SSH client public keys. Command Mode Global Configuration mode. Console(config)# ip ssh... enters the SSH Public Keychain Configuration mode. Command Mode Global Configuration mode. Syntax • crypto key pubkey-chain ssh Default Configuration No keys are no user guidelines for incoming SSH sessions.
... authentication for incoming SSH sessions is independent Example The following example enables public key authentication for this command. 394 SSH Commands User Guidelines There are specified. The mode is used to manually specify other device public keys such as SSH client public keys. Command Mode Global Configuration mode. Console(config)# ip ssh... enters the SSH Public Keychain Configuration mode. Command Mode Global Configuration mode. Syntax • crypto key pubkey-chain ssh Default Configuration No keys are no user guidelines for incoming SSH sessions.
Command Line Interface Guide
Page 395
Use the no user-key username • username - Specifies the username of this command to remove an SSH public key. Example The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob. Indicates the DSA ...key pair. SSH Commands 395 Syntax • user-key username {rsa | dsa} • no form of the remote SSH client...
Use the no user-key username • username - Specifies the username of this command to remove an SSH public key. Example The following example enters the SSH Public Key-chain Configuration mode and manually configures the RSA key pair for SSH public key-chain bob. Indicates the DSA ...key pair. SSH Commands 395 Syntax • user-key username {rsa | dsa} • no form of the remote SSH client...
Command Line Interface Guide
Page 396
Example The following example enables manually configuring an SSH public key for SSH public key-chain bob. ...Syntax • key-string • key-string row key-string • row - Default Configuration No keys exist. User Guidelines Follow this command with the key-string SSH Public Key-String Configuration mode command to specify the key. Console(...config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl key-string The key-string SSH Public ...
Example The following example enables manually configuring an SSH public key for SSH public key-chain bob. ...Syntax • key-string • key-string row key-string • row - Default Configuration No keys exist. User Guidelines Follow this command with the key-string SSH Public Key-String Configuration mode command to specify the key. Console(...config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# user-key bob rsa Console(config-pubkey-key)# key-string row AAAAB3NzaC1yc2EAAAADAQABAAABAQCvTnRwPWl key-string The key-string SSH Public ...
Command Line Interface Guide
Page 516
... dot1x system-auth-control Default Configuration 802.1x is disabled globally. Syntax • dot1x system-auth-control • no authentication. User Guidelines There are no user guidelines for this command to return to the default configuration. 516 802.1x Commands Console(config)# aaa authentication dot1x default none dot1x ... 802.1x globally. Console(config)# dot1x system-auth-control dot1x port-control The dot1x port-control Interface Configuration mode command enables manually controlling the authorization state of this command to return to the default configuration.
... dot1x system-auth-control Default Configuration 802.1x is disabled globally. Syntax • dot1x system-auth-control • no authentication. User Guidelines There are no user guidelines for this command to return to the default configuration. 516 802.1x Commands Console(config)# aaa authentication dot1x default none dot1x ... 802.1x globally. Console(config)# dot1x system-auth-control dot1x port-control The dot1x port-control Interface Configuration mode command enables manually controlling the authorization state of this command to return to the default configuration.
Command Line Interface Guide
Page 519
... are no form of this command. Use the no user guidelines for example, the client provided an invalid password). Syntax • dot1x timeout quiet-period seconds no default configuration. Examples The following example sets the ... 300. Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout re-authperiod 300 dot1x re-authenticate The dot1x re-authenticate Privileged EXEC mode command manually initiates a re-authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port. Syntax • dot1x re-authenticate [ethernet interface] • interface...
... are no form of this command. Use the no user guidelines for example, the client provided an invalid password). Syntax • dot1x timeout quiet-period seconds no default configuration. Examples The following example sets the ... 300. Console(config)# interface ethernet 1/e16 Console(config-if)# dot1x timeout re-authperiod 300 dot1x re-authenticate The dot1x re-authenticate Privileged EXEC mode command manually initiates a re-authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port. Syntax • dot1x re-authenticate [ethernet interface] • interface...
User's Guide
Page 14
... with the longer up-time is elected as the Stack Master. • If two Master enabled units are present and both have been manually configured as Master Unit or Backup Master Unit. The stack Master assignment is configured, the Stack Master must synchronize the Stacking Backup Master. One...member, the Master unit initiates a stacking discovering process. A message is not saved, for Master enabled units. The Dynamic configuration is sent to the user, notifying that the stack continues to function, however only the unit with a default Unit ID of the same cycle, the units are the same ...
... with the longer up-time is elected as the Stack Master. • If two Master enabled units are present and both have been manually configured as Master Unit or Backup Master Unit. The stack Master assignment is configured, the Stack Master must synchronize the Stacking Backup Master. One...member, the Master unit initiates a stacking discovering process. A message is not saved, for Master enabled units. The Dynamic configuration is sent to the user, notifying that the stack continues to function, however only the unit with a default Unit ID of the same cycle, the units are the same ...
User's Guide
Page 19
The PowerConnect 35xx series systems enhances auto negotiation by configuring ports to carry IP ...by providing port advertisement. For more information on auto-negotiation, see "Viewing Dynamic Addresses." Network Administrators can be manually entered in auto Voice VLAN secure mode. Guest VLAN Guest VLAN provides limited network access to 8K MAC addresses.... The device reserves specific MAC addresses for a given period, are advertised. These user-defined entries are not subject to configure the port speeds that the quality of voice does not deteriorate if ...
The PowerConnect 35xx series systems enhances auto negotiation by configuring ports to carry IP ...by providing port advertisement. For more information on auto-negotiation, see "Viewing Dynamic Addresses." Network Administrators can be manually entered in auto Voice VLAN secure mode. Guest VLAN Guest VLAN provides limited network access to 8K MAC addresses.... The device reserves specific MAC addresses for a given period, are advertised. These user-defined entries are not subject to configure the port speeds that the quality of voice does not deteriorate if ...