Command Line Interface Guide
Page 3
Contents 1 Command Groups 55 Introduction 55 Command Groups 55 Layer 2 Commands 61 2 Using the CLI 135 135 Introduction 135 Entering and Editing CLI Commands 135 CLI Command Modes 141 3 Layer 2 Commands 187 Introduction 187 4 AAA Commands 188 aaa authentication enable 190 aaa authentication login 191 aaa authorization network default radius 193 Contents 3
Contents 1 Command Groups 55 Introduction 55 Command Groups 55 Layer 2 Commands 61 2 Using the CLI 135 135 Introduction 135 Entering and Editing CLI Commands 135 CLI Command Modes 141 3 Layer 2 Commands 187 Introduction 187 4 AAA Commands 188 aaa authentication enable 190 aaa authentication login 191 aaa authorization network default radius 193 Contents 3
Command Line Interface Guide
Page 50
key-string 1268 show crypto key mypubkey 1270 show crypto key pubkey-chain ssh 1271 show ip ssh 1273 user-key 1274 70 Syslog Commands 1275 clear logging file 1276 description 1277 level 1278 logging cli-command 1278 logging 1279 logging buffered 1280 logging console 1281 logging facility 1282 logging file 1282 logging on 1283 logging snmp 1284 logging web-session 1285 port 1285 show logging 1286 show logging file 1288 50 Contents
key-string 1268 show crypto key mypubkey 1270 show crypto key pubkey-chain ssh 1271 show ip ssh 1273 user-key 1274 70 Syslog Commands 1275 clear logging file 1276 description 1277 level 1278 logging cli-command 1278 logging 1279 logging buffered 1280 logging console 1281 logging facility 1282 logging file 1282 logging on 1283 logging snmp 1284 logging web-session 1285 port 1285 show logging 1286 show logging file 1288 50 Contents
Command Line Interface Guide
Page 55
...driven software application. Command Groups The system commands can be completed before using this document. A switch can be accessed from the CLI, which is based solely on textual input and output with commands being entered by entering commands from a console terminal connected to the... UNIX C shell. This guide also provides information for configuring the PowerConnect switch, details the procedures, and provides configuration examples. Table 1-1. The CLI is a basic command-line interpreter similar to an EIA/TIA-232 port or through an ...
...driven software application. Command Groups The system commands can be completed before using this document. A switch can be accessed from the CLI, which is based solely on textual input and output with commands being entered by entering commands from a console terminal connected to the... UNIX C shell. This guide also provides information for configuring the PowerConnect switch, details the procedures, and provides configuration examples. Table 1-1. The CLI is a basic command-line interpreter similar to an EIA/TIA-232 port or through an ...
Command Line Interface Guide
Page 58
.... Management ACL Configures and displays management access-list information. Power Over Ethernet (PoE) Configures PoE and displays PoE information. RMON Can be configured through the CLI and displays RMON information. Virtual Router Redundancy (IPv4) Manages router redundancy on the system. SNMP Configures SNMP communities, traps and displays SNMP information. Configuration and...
.... Management ACL Configures and displays management access-list information. Power Over Ethernet (PoE) Configures PoE and displays PoE information. RMON Can be configured through the CLI and displays RMON information. Virtual Router Redundancy (IPv4) Manages router redundancy on the system. SNMP Configures SNMP communities, traps and displays SNMP information. Configuration and...
Command Line Interface Guide
Page 59
Configures web-based access to the switch. Configures the switch clock, name and authorized users. Configures Telnet service on the switch and displays Telnet information. Table 1-1. Describes user commands used for entering CLI commands. Command Groups 59 System Command Groups (continued) Command Group Syslog System Management Telnet Server User Interface Web Server Description Manages and displays syslog messages.
Configures web-based access to the switch. Configures the switch clock, name and authorized users. Configures Telnet service on the switch and displays Telnet information. Table 1-1. Describes user commands used for entering CLI commands. Command Groups 59 System Command Groups (continued) Command Group Syslog System Management Telnet Server User Interface Web Server Description Manages and displays syslog messages.
Command Line Interface Guide
Page 77
... each interface queue. Command Groups 77 GC classofservice dotlpmapping Maps an 802.1p priority to which the associated PCM traffic stream is available in the CLI. and IC cos-queue strict Activates the strict priority scheduler mode for a switch. QoS Command Description Mode* assign-queue Modifies the queue ID to an...
... each interface queue. Command Groups 77 GC classofservice dotlpmapping Maps an 802.1p priority to which the associated PCM traffic stream is available in the CLI. and IC cos-queue strict Activates the strict priority scheduler mode for a switch. QoS Command Description Mode* assign-queue Modifies the queue ID to an...
Command Line Interface Guide
Page 129
... messages sent to the logging file GC based on page 60. Syslog Command clear logging clear logging file description level loggin cli-command logging logging buffered logging console logging facility logging file logging on GC severity. Displays the syslog servers settings. PE user...Command Description Mode* show syslog-servers Description Mode* Clears messages from the internal logging PE buffer. PE Command Groups 129 Enable CLI command logging GC Logs messages to the console based on port show logging show logging file show ip ssh Displays the SSH server...
... messages sent to the logging file GC based on page 60. Syslog Command clear logging clear logging file description level loggin cli-command logging logging buffered logging console logging facility logging file logging on GC severity. Displays the syslog servers settings. PE user...Command Description Mode* show syslog-servers Description Mode* Clears messages from the internal logging PE buffer. PE Command Groups 129 Enable CLI command logging GC Logs messages to the console based on port show logging show logging file show ip ssh Displays the SSH server...
Command Line Interface Guide
Page 132
... on the GC switch. NOTE: *For the meaning of each Mode abbreviation, see "Mode Types" on page 60. 132 Command Groups UE end Gets the CLI user control back to their destinations. mode simple Selects the simple mode as the start up mode. Telnet Server Command Description Mode* ip telnet server...: *For the meaning of each Mode abbreviation, see "Mode Types" on page 60. Command Description Mode* switch renumber Changes the identifier for a switch in the CLI mode hierarchy. GC NOTE: *For the meaning of the Telnet server and the PE Telnet service port number.
... on the GC switch. NOTE: *For the meaning of each Mode abbreviation, see "Mode Types" on page 60. 132 Command Groups UE end Gets the CLI user control back to their destinations. mode simple Selects the simple mode as the start up mode. Telnet Server Command Description Mode* ip telnet server...: *For the meaning of each Mode abbreviation, see "Mode Types" on page 60. Command Description Mode* switch renumber Changes the identifier for a switch in the CLI mode hierarchy. GC NOTE: *For the meaning of the Telnet server and the PE Telnet service port number.
Command Line Interface Guide
Page 135
... command options are available in each mode or within an Interface Configuration, the CLI provides a method of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. 2 Using the CLI Introduction This chapter describes the basics of displaying the available commands, the command syntax requirements and in...
... command options are available in each mode or within an Interface Configuration, the CLI provides a method of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. 2 Using the CLI Introduction This chapter describes the basics of displaying the available commands, the command syntax requirements and in...
Command Line Interface Guide
Page 136
This buffer is the same as disabling the history buffer system. 136 Using the CLI Repeats the key sequence to 216. Down-arrow Returns to CLI command entry and editing: • History Buffer • Negating Commands • Show Command • Command Completion • Short ...the buffer, which operates on Multiple Objects (Range) • Command Scripting • CLI Command Notation Conventions • Interface Naming Conventions History Buffer Every time a command is entered in the CLI, it is enabled, but it can be increased to recall successively older commands. ...
This buffer is the same as disabling the history buffer system. 136 Using the CLI Repeats the key sequence to 216. Down-arrow Returns to CLI command entry and editing: • History Buffer • Negating Commands • Show Command • Command Completion • Short ...the buffer, which operates on Multiple Objects (Range) • Command Scripting • CLI Command Notation Conventions • Interface Naming Conventions History Buffer Every time a command is entered in the CLI, it is enabled, but it can be increased to recall successively older commands. ...
Command Line Interface Guide
Page 137
...history-size command in the Line command mode chapter of all commands to assist in editing the CLI commands. As long as if the user typed the full command. Using the CLI 137 Negating Commands For many commands, the prefix keyword no is changed into a complete command. ... an incomplete command is entered to cancel the effect of a command or reset the configuration to recognize the entered command unambiguously, the CLI accepts the short form of keyboard shortcuts to which it is displayed to identify a single matching command, the key displays the available commands...
...history-size command in the Line command mode chapter of all commands to assist in editing the CLI commands. As long as if the user typed the full command. Using the CLI 137 Negating Commands For many commands, the prefix keyword no is changed into a complete command. ... an incomplete command is entered to cancel the effect of a command or reset the configuration to recognize the entered command unambiguously, the CLI accepts the short form of keyboard shortcuts to which it is displayed to identify a single matching command, the key displays the available commands...
Command Line Interface Guide
Page 138
...: • Operations on objects with four or more instances support the range operation. • The range key word is used to operate. 138 Using the CLI Delete previous word Transpose previous character Go to previous line history buffer Rewrites or pastes the line Go to next line in history buffer Print... command prompt Command-line completion Return to the root command prompt Go to next lower command prompt List choices Operating on Multiple Objects (Range) The CLI allows the user to operate on which to identify the range of objects on the set of the line.
...: • Operations on objects with four or more instances support the range operation. • The range key word is used to operate. 138 Using the CLI Delete previous word Transpose previous character Go to previous line history buffer Rewrites or pastes the line Go to next line in history buffer Print... command prompt Command-line completion Return to the root command prompt Go to next lower command prompt List choices Operating on Multiple Objects (Range) The CLI allows the user to operate on which to identify the range of objects on the set of the line.
Command Line Interface Guide
Page 139
...must be a fully qualified port identifier, that the operation applies to execute the operation on unit 1. Command Scripting The CLI can be used as a comment and ignored by the CLI. • The range may not be configured in a range (for example, parameters that must be uniquely configured for... each port or interface. a range from a particular instance to disable session timeouts. The CLI provides the user with a detailed list of objects, the CLI attempts to the gigabit Ethernet ports 1, 3, and 5 on as many objects in the list as possible even if ...
...must be a fully qualified port identifier, that the operation applies to execute the operation on unit 1. Command Scripting The CLI can be used as a comment and ignored by the CLI. • The range may not be configured in a range (for example, parameters that must be uniquely configured for... each port or interface. a range from a particular instance to disable session timeouts. The CLI provides the user with a detailed list of objects, the CLI attempts to the gigabit Ethernet ports 1, 3, and 5 on as many objects in the list as possible even if ...
Command Line Interface Guide
Page 140
...into the command as it is. g stands for gigabit Ethernet port (for the flowcontrol command either auto, on the keyboard. CLI Command Notation Conventions When entering commands there are certain command-entry notations which apply to form a virtual switch. The following interface types...the physical switch identifier within the second unit. • Unit# - Italic Indicates a variable. all commands. the unit number is used in CLI commands are defined. is the gigabit port 2). One option must be selected. For example, 2/g10 identifies the gigabit port 10 within the ...
...into the command as it is. g stands for gigabit Ethernet port (for the flowcontrol command either auto, on the keyboard. CLI Command Notation Conventions When entering commands there are certain command-entry notations which apply to form a virtual switch. The following interface types...the physical switch identifier within the second unit. • Unit# - Italic Indicates a variable. all commands. the unit number is used in CLI commands are defined. is the gigabit port 2). One option must be selected. For example, 2/g10 identifies the gigabit port 10 within the ...
Command Line Interface Guide
Page 141
...commands. When starting a session, the initial mode is required. Layer 3 (Network Layer) describes how a series of CLI commands is very large, the CLI is structured as a command-tree hierarchy, where related command sets are defined at the top of the hierarchy tree. ...Layer 3 (Network Layer) commands • Utility Commands Layer 2 (Data Link Layer) describes the logical organization of the Internet. Using the CLI 141 This layer defines the addressing and routing structure of data bits transmitted on a particular medium. This level is available in this guide,...
...commands. When starting a session, the initial mode is required. Layer 3 (Network Layer) describes how a series of CLI commands is very large, the CLI is structured as a command-tree hierarchy, where related command sets are defined at the top of the hierarchy tree. ...Layer 3 (Network Layer) commands • Utility Commands Layer 2 (Data Link Layer) describes the logical organization of the Internet. Using the CLI 141 This layer defines the addressing and routing structure of data bits transmitted on a particular medium. This level is available in this guide,...
Command Line Interface Guide
Page 142
... password is password-protected to another. Privileged EXEC Mode Because many of the switch host name followed by the angle bracket (>). console# 142 Using the CLI The user-level prompt consists of the privileged commands set operating parameters, privileged access is not displayed on a global level. The Global Configuration mode manages...
... password is password-protected to another. Privileged EXEC Mode Because many of the switch host name followed by the angle bracket (>). console# 142 Using the CLI The user-level prompt consists of the privileged commands set operating parameters, privileged access is not displayed on a global level. The Global Configuration mode manages...
Command Line Interface Guide
Page 143
... ospf is used to enter into the Router OSPF Configuration mode. • Router RIP Configuration - Contains commands to define management access administration lists. Using the CLI 143
... ospf is used to enter into the Router OSPF Configuration mode. • Router RIP Configuration - Contains commands to define management access administration lists. Using the CLI 143
Command Line Interface Guide
Page 144
...; Stack - Use the policy-map command to access the QoS policy map configuration mode to enter the SSH Public-Key Configuration mode. 144 Using the CLI Use the class-map class-map-name commands to access the QoS Class Map Configuration mode to manage the member ports as a single entity. This...
...; Stack - Use the policy-map command to access the QoS policy map configuration mode to enter the SSH Public-Key Configuration mode. 144 Using the CLI Use the class-map class-map-name commands to access the QoS Class Map Configuration mode to manage the member ports as a single entity. This...
Command Line Interface Guide
Page 145
... the parameters for the RADIUS server. • SNMP Host Configuration - Configures the parameters for the SNMP v3 server host. • SNMP Community Configuration - Using the CLI 145 Configures conditions required to enter the MAC Access-List configuration mode. • TACACS - Configures the parameters for crypto certificate generate. • Logging - Identifying the...
... the parameters for the RADIUS server. • SNMP Host Configuration - Configures the parameters for the SNMP v3 server host. • SNMP Community Configuration - Using the CLI 145 Configures conditions required to enter the MAC Access-List configuration mode. • TACACS - Configures the parameters for crypto certificate generate. • Logging - Identifying the...
Command Line Interface Guide
Page 146
... the system does not allow configuration. The # sign is password protected. Use the exit command, or press + to return to navigate through the CLI Command Mode hierarchy. Navigating CLI Command Modes The following table describes how to the User EXEC mode. console(config)# Use the exit command, or press + to return to...
... the system does not allow configuration. The # sign is password protected. Use the exit command, or press + to return to navigate through the CLI Command Mode hierarchy. Navigating CLI Command Modes The following table describes how to the User EXEC mode. console(config)# Use the exit command, or press + to return to...