Command Line Interface Guide
Page 28
... Configuration mode. • QoS - If access is via a Telnet connection. The following steps are for example, assigning ports to using CLI commands. Contains commands to configure port-channels, for use on a UNIX system. Contains commands to manage port configuration. Contains commands to create a VLAN as line speed, timeout settings, etc. NOTE: The following are the Interface Configuration modes: • Line Interface - Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands are to manually specify other device SSH public keys...
... Configuration mode. • QoS - If access is via a Telnet connection. The following steps are for example, assigning ports to using CLI commands. Contains commands to configure port-channels, for use on a UNIX system. Contains commands to manage port configuration. Contains commands to create a VLAN as line speed, timeout settings, etc. NOTE: The following are the Interface Configuration modes: • Line Interface - Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands are to manually specify other device SSH public keys...
Command Line Interface Guide
Page 33
...This guide describes how the Command Line Interface (CLI) is a basic command-line interpreter similar to the console port of a Graphic User Interface (GUI) driven software application. Command Groups Introduction The Command Language Interface (CLI) is described in setting up a minimum configuration, so that the device can be managed from the Web Based Interface. Command Group Description ACL Commands Configures and displays ACL configuration and information. Clock Commands Configures clock commands on the Setup Wizard. DHCP Snooping Commands Configures DHCP snooping and...
...This guide describes how the Command Line Interface (CLI) is a basic command-line interpreter similar to the console port of a Graphic User Interface (GUI) driven software application. Command Groups Introduction The Command Language Interface (CLI) is described in setting up a minimum configuration, so that the device can be managed from the Web Based Interface. Command Group Description ACL Commands Configures and displays ACL configuration and information. Clock Commands Configures clock commands on the Setup Wizard. DHCP Snooping Commands Configures DHCP snooping and...
Command Line Interface Guide
Page 34
... user commands used for example ports, storm control, port speed and auto-negotiation. Configures and reports on the device. Ethernet Configuration GVRP Commands IGMP Snooping Commands IP Addressing Commands IPv6 Addressing Commands iSCSI Commands LACP Commands Line Commands Login Banner Commands Management ACL Commands PHY Diagnostics Commands Port Channel Commands Port Monitor Commands QoS Commands RADIUS Commands RMON Commands SNMP Commands Spanning Tree Commands SSH Commands Syslog Commands System Management Commands TACACS Commands TIC Commands Tunnel Commands User Interface Commands...
... user commands used for example ports, storm control, port speed and auto-negotiation. Configures and reports on the device. Ethernet Configuration GVRP Commands IGMP Snooping Commands IP Addressing Commands IPv6 Addressing Commands iSCSI Commands LACP Commands Line Commands Login Banner Commands Management ACL Commands PHY Diagnostics Commands Port Channel Commands Port Monitor Commands QoS Commands RADIUS Commands RMON Commands SNMP Commands Spanning Tree Commands SSH Commands Syslog Commands System Management Commands TACACS Commands TIC Commands Tunnel Commands User Interface Commands...
Command Line Interface Guide
Page 62
...auto. VLAN Configuration dot1x multiple-hosts Allows multiple hosts (clients) on an 802.1X-authorized port with the dot1x port-control Interface Configuration mode command set to default. Interface Configuration (Ethernet) dot1x single-hostviolation Configures the action to access the interface. (Ethernet) dot1x guest-vlan Defines a Guest VLAN. the MAC address is not the supplicant MAC address uration attempts to be taken when a station of which Interface Config- Guest VLAN. vlan Interface Configuration show dot1x advanced Displays 802.1X advanced features for the switch...
...auto. VLAN Configuration dot1x multiple-hosts Allows multiple hosts (clients) on an 802.1X-authorized port with the dot1x port-control Interface Configuration mode command set to default. Interface Configuration (Ethernet) dot1x single-hostviolation Configures the action to access the interface. (Ethernet) dot1x guest-vlan Defines a Guest VLAN. the MAC address is not the supplicant MAC address uration attempts to be taken when a station of which Interface Config- Guest VLAN. vlan Interface Configuration show dot1x advanced Displays 802.1X advanced features for the switch...
Command Line Interface Guide
Page 64
... the software uses to default. Specifies authentication methods for use by the SSH server. Enables Internet Group Management Protocol (IGMP) snooping Sets the available name servers. Enters the Interface Configuration mode to the previous command mode. Configures a TCP port for use by a web browser to configure multiple portchannels. Ends the current configuration session and returns to configure an Ethernet type interface. Specifies the port to be used by a secure web browser to be configured from a browser. dot1x system-auth-control enable password end gvrp enable (global...
... the software uses to default. Specifies authentication methods for use by the SSH server. Enables Internet Group Management Protocol (IGMP) snooping Sets the available name servers. Enters the Interface Configuration mode to the previous command mode. Configures a TCP port for use by a web browser to configure multiple portchannels. Ends the current configuration session and returns to configure an Ethernet type interface. Specifies the port to be used by a secure web browser to be configured from a browser. dot1x system-auth-control enable password end gvrp enable (global...
Command Line Interface Guide
Page 66
... Command Modes radius-server source-ip Specifies the source IP address used for communication with RADIUS servers. rmon alarm Configures alarm conditions. snmp-server location Sets up the information on an interface spanning-tree forward-time Configures the spanning tree bridge forward time. snmp-server set Sets SNMP MIB value by the CLI. sntp authentication-key Defines an authentication key for a server host to SNMP protocol. rmon event Configures a RMON event. rmon table-size Configures the maximum RMON tables sizes. spanning-tree hello-time Configures the...
... Command Modes radius-server source-ip Specifies the source IP address used for communication with RADIUS servers. rmon alarm Configures alarm conditions. snmp-server location Sets up the information on an interface spanning-tree forward-time Configures the spanning tree bridge forward time. snmp-server set Sets SNMP MIB value by the CLI. sntp authentication-key Defines an authentication key for a server host to SNMP protocol. rmon event Configures a RMON event. rmon table-size Configures the maximum RMON tables sizes. spanning-tree hello-time Configures the...
Command Line Interface Guide
Page 74
... Ethernet Statistics history. Displays system information. Enables automatic learning of Multicast router ports in the context of all Multicast frames on a port. Creates a VLAN. 74 Command Modes Displays the RMON logging table. VC (VLAN Configuration) Mode Command bridge address bridge multicast address bridge multicast forbidden address bridge multicast forbidden forward-all bridge multicast forward-all ip igmp snooping (Interface) ip igmp snooping leave-time-out show version Displays the alarms summary table. Registers MAC-layer Multicast addresses to the bridge table, and adds...
... Ethernet Statistics history. Displays system information. Enables automatic learning of Multicast router ports in the context of all Multicast frames on a port. Creates a VLAN. 74 Command Modes Displays the RMON logging table. VC (VLAN Configuration) Mode Command bridge address bridge multicast address bridge multicast forbidden address bridge multicast forbidden forward-all bridge multicast forward-all ip igmp snooping (Interface) ip igmp snooping leave-time-out show version Displays the alarms summary table. Registers MAC-layer Multicast addresses to the bridge table, and adds...
Command Line Interface Guide
Page 336
... the user belongs. (Range: Up to SNMP views Console (config)# snmp-server group user-group v3 priv read user-view snmp-server user The snmp-server user Global Configuration mode command configures a new SNMP Version 3 user. Each byte in the MIB. The user should enter password. • password - The name of the command to 30 characters) • auth-md5-key - The user should enter password. • auth-sha - Use the no snmp-server user username [remote engineid-string ] • username - The HMAC-MD5-96 authentication level. Default Configuration No...
... the user belongs. (Range: Up to SNMP views Console (config)# snmp-server group user-group v3 priv read user-view snmp-server user The snmp-server user Global Configuration mode command configures a new SNMP Version 3 user. Each byte in the MIB. The user should enter password. • password - The name of the command to 30 characters) • auth-md5-key - The user should enter password. • auth-sha - Use the no snmp-server user username [remote engineid-string ] • username - The HMAC-MD5-96 authentication level. Default Configuration No...
Command Line Interface Guide
Page 348
...tree mode • stp - User Guidelines • In RSTP mode, the switch would use STP when the neighbor switch is using STP. • In MSTP mode the switch would use RSTP when the neighbor switch is using STP Example The following example configures the spanning-tree protocol to reset the default forward time. Command Modes Global Configuration mode. 348 Spanning-Tree Commands MSTP is using RSTP, and would use STP when the neighbor switch is enabled Default Configuration STP configured. Console(config)# spanning-tree mode rstp spanning-tree forward-time The spanning-tree forward...
...tree mode • stp - User Guidelines • In RSTP mode, the switch would use STP when the neighbor switch is using STP. • In MSTP mode the switch would use RSTP when the neighbor switch is using STP Example The following example configures the spanning-tree protocol to reset the default forward time. Command Modes Global Configuration mode. 348 Spanning-Tree Commands MSTP is using RSTP, and would use STP when the neighbor switch is enabled Default Configuration STP configured. Console(config)# spanning-tree mode rstp spanning-tree forward-time The spanning-tree forward...
User's Guide
Page 13
... 13 This User Guide contains the information needed for this product. Figure 1-1. PowerConnect 5424 Front Panel Figure 1-2. There are also four SFP fiber ports that are single ports with two physical connections. The combo ports are designated as combo port alternatives to the last four Ethernet ports. The release notes can be downloaded from support.dell.com. PowerConnect 54xx Series Systems The PowerConnect 54xx series systems have two versions: 5424 has 24 Gigabit Ethernet ports, and...
... 13 This User Guide contains the information needed for this product. Figure 1-1. PowerConnect 5424 Front Panel Figure 1-2. There are also four SFP fiber ports that are single ports with two physical connections. The combo ports are designated as combo port alternatives to the last four Ethernet ports. The release notes can be downloaded from support.dell.com. PowerConnect 54xx Series Systems The PowerConnect 54xx series systems have two versions: 5424 has 24 Gigabit Ethernet ports, and...
User's Guide
Page 16
..., including IGMP Querier which Multicast routers are stored in the Bridging Table. From the frame, the device identifies work stations to the Hardware Table. When Layer 2 frames are forwarded, Broadcast and Multicast frames are added to an upstream Multicast router. VLAN-aware MAC-based Switching Packets arriving from an unknown source address are sent to the microprocessor, where the source addresses are flooded to a specific Multicast address, from work stations configured for information distribution. Port Mirroring Port mirroring monitors and mirrors network traffic by...
..., including IGMP Querier which Multicast routers are stored in the Bridging Table. From the frame, the device identifies work stations to the Hardware Table. When Layer 2 frames are forwarded, Broadcast and Multicast frames are added to an upstream Multicast router. VLAN-aware MAC-based Switching Packets arriving from an unknown source address are sent to the microprocessor, where the source addresses are flooded to a specific Multicast address, from work stations configured for information distribution. Port Mirroring Port mirroring monitors and mirrors network traffic by...
User's Guide
Page 22
... disable the port. Ports are either admitted or denied entry and the ingress port is a protocol that port. Dynamic VLAN Assignment (DVA) allows network administrators to automatically assign users to define classification actions and rules for specific ingress ports. RADIUS Client RADIUS is currently available. TACACS+ TACACS+ provides centralized security for device connections and authentication. Packets entering an ingress port, with specific MAC addresses. Access Control Lists (ACL) Access Control Lists (ACL) allow network managers to VLANs during the RADIUS server...
... disable the port. Ports are either admitted or denied entry and the ingress port is a protocol that port. Dynamic VLAN Assignment (DVA) allows network administrators to automatically assign users to define classification actions and rules for specific ingress ports. RADIUS Client RADIUS is currently available. TACACS+ TACACS+ provides centralized security for device connections and authentication. Packets entering an ingress port, with specific MAC addresses. Access Control Lists (ACL) Access Control Lists (ACL) allow network managers to VLANs during the RADIUS server...
User's Guide
Page 47
... DHCP and BOOTP, the configuration received from a DHCP server, perform the following steps: 1 Select and connect any port to a DHCP server or to a subnet that has a DHCP server on it, in the configuration file, but not the IP address. Thank you for receiving the IP address. Enter [Y] to restart the Setup Wizard. Wizard Step 6 The CLI prompt is displayed: Configuring SNMP management interface Configuring user account...... When the device is reset, the DHCP command is saved...
... DHCP and BOOTP, the configuration received from a DHCP server, perform the following steps: 1 Select and connect any port to a DHCP server or to a subnet that has a DHCP server on it, in the configuration file, but not the IP address. Thank you for receiving the IP address. Enter [Y] to restart the Setup Wizard. Wizard Step 6 The CLI prompt is displayed: Configuring SNMP management interface Configuring user account...... When the device is reset, the DHCP command is saved...
User's Guide
Page 171
... user name. The TACACS server checks the user privileges. Indicates the expiration date of the CLI commands: console(config)# enable password level 15 secret Defining TACACS+ Settings The devices provide Terminal Access Controller Access Control System (TACACS+) client support. Table 6-36. Specifies LOCKOUT, when the user account is updated. Performed at login. Specifies the number of users accessing the device. The TACACS+ protocol ensures network integrity through encrypted protocol exchanges between the device and TACACS+ server. Configuring...
... user name. The TACACS server checks the user privileges. Indicates the expiration date of the CLI commands: console(config)# enable password level 15 secret Defining TACACS+ Settings The devices provide Terminal Access Controller Access Control System (TACACS+) client support. Table 6-36. Specifies LOCKOUT, when the user account is updated. Performed at login. Specifies the number of users accessing the device. The TACACS+ protocol ensures network integrity through encrypted protocol exchanges between the device and TACACS+ server. Configuring...
User's Guide
Page 269
...Defining DHCP Snooping on the switch. To remove the access control, use the service-acl command in interface configuration mode. Interfaces are untrusted if the packet is an example of some of this command. Trusted interfaces receive packets only from an interface beyond the network firewall. By enabling DHCP Snooping network administrators can differentiate between untrusted interfaces and DHCP servers. The DHCP Snooping Table contains the untrusted interfaces' MAC address, IP address, Lease Time, VLAN ID, and interface information. Table 7-7. DHCP Snooping creates...
...Defining DHCP Snooping on the switch. To remove the access control, use the service-acl command in interface configuration mode. Interfaces are untrusted if the packet is an example of some of this command. Trusted interfaces receive packets only from an interface beyond the network firewall. By enabling DHCP Snooping network administrators can differentiate between untrusted interfaces and DHCP servers. The DHCP Snooping Table contains the untrusted interfaces' MAC address, IP address, Lease Time, VLAN ID, and interface information. Table 7-7. DHCP Snooping creates...
User's Guide
Page 292
...: • Ports cannot be configured as a source port. • Ports cannot be a LAG member. • IP interfaces are suspended. This includes Spanning Tree and LACP. The following is configured by forwarding copies of the CLI commands: console> enable console# configure Console(config)# port storm-control include-multicast Console(config)# port storm-control broadcast rate 8000 Console(config)# interface ethernet g1 Console(config-if)# port storm-control broadcast enable Console(config-if)# end Console# show ports storm-control Port Broadcast Storm control [Packets/sec...
...: • Ports cannot be configured as a source port. • Ports cannot be a LAG member. • IP interfaces are suspended. This includes Spanning Tree and LACP. The following is configured by forwarding copies of the CLI commands: console> enable console# configure Console(config)# port storm-control include-multicast Console(config)# port storm-control broadcast rate 8000 Console(config)# interface ethernet g1 Console(config-if)# port storm-control broadcast enable Console(config-if)# end Console# show ports storm-control Port Broadcast Storm control [Packets/sec...
User's Guide
Page 438
... specific IP address is sent to a monitoring port. Query Extracts information from a database and presents the information for authenticating system users, and tracking connection time. RS Router Solicitation. Routers forward packets between two or more networks. RSTP Rapid Spanning Tree Protocol. Port Mirroring Monitors and mirrors network traffic by forwarding copies of the spanning tree, without creating forwarding loops. 438 Glossary RD RADIUS Discovery. Router A device that governs how devices exchange information across networks. A packet is available. RADIUS Remote...
... specific IP address is sent to a monitoring port. Query Extracts information from a database and presents the information for authenticating system users, and tracking connection time. RS Router Solicitation. Routers forward packets between two or more networks. RSTP Rapid Spanning Tree Protocol. Port Mirroring Monitors and mirrors network traffic by forwarding copies of the spanning tree, without creating forwarding loops. 438 Glossary RD RADIUS Discovery. Router A device that governs how devices exchange information across networks. A packet is available. RADIUS Remote...
Getting Started Guide
Page 71
... de gestion, par exemple 192.168.1.10. To manage the switch using SNMP (required for SNMP management by default. Would you can use Dell Network Manager or other accounts and change this account. The wizard automatically assigns the highest access level [Privilege Level 15] to setup the SNMP management interface now? [Y/N] Y Entrez [N] pour passer à l'étape 2. To add a management station: Please enter the SNMP community string to be used to login to access...
... de gestion, par exemple 192.168.1.10. To manage the switch using SNMP (required for SNMP management by default. Would you can use Dell Network Manager or other accounts and change this account. The wizard automatically assigns the highest access level [Privilege Level 15] to setup the SNMP management interface now? [Y/N] Y Entrez [N] pour passer à l'étape 2. To add a management station: Please enter the SNMP community string to be used to login to access...
Getting Started Guide
Page 108
... is used to login to access the CLI, Web interface, or SNMP interface for the switch. To setup an IP address: Please enter the IP address of which all ports are members. To setup a user account: Please enter the user name: Please enter the user password: Please reenter the user password: admin Enter. Βήμα 3 Next, an IP address is defined on setting up user accounts and changing privilege levels, see the user documentation. This...
... is used to login to access the CLI, Web interface, or SNMP interface for the switch. To setup an IP address: Please enter the IP address of which all ports are members. To setup a user account: Please enter the user name: Please enter the user password: Please reenter the user password: admin Enter. Βήμα 3 Next, an IP address is defined on setting up user accounts and changing privilege levels, see the user documentation. This...
Getting Started Guide
Page 162
...The IP address is the IP address you use to access the CLI, Web interface, or SNMP interface for the switch. You may setup other accounts and change privilege levels later. To setup an IP address: Please enter the IP address of which all ports are members. For more information on the default VLAN (VLAN #1), ...is defined on setting up user accounts and changing privilege levels, see the user documentation. Krok 3 kreatora Wyświetlane są następujące informacje: Next, an IP address is used to login to setup your initial privilege (Level 15) user account. Naciś...
...The IP address is the IP address you use to access the CLI, Web interface, or SNMP interface for the switch. You may setup other accounts and change privilege levels later. To setup an IP address: Please enter the IP address of which all ports are members. For more information on the default VLAN (VLAN #1), ...is defined on setting up user accounts and changing privilege levels, see the user documentation. Krok 3 kreatora Wyświetlane są następujące informacje: Next, an IP address is used to login to setup your initial privilege (Level 15) user account. Naciś...