Command Line Interface Guide
Page 55
...displayed as text via a terminal monitor. Configures and displays ACL information. 1 Command Groups Introduction The Command Line Interface (CLI) is a network management application operated through a Telnet session....Command Groups Command Group Layer 2 Commands AAA ACL Description Configures connection security including authorization and passwords. A switch can be completed before using this document. The CLI is structured, describes the command syntax, and describes the command functionality. Command Groups 55 This guide also provides information for configuring the PowerConnect...
...displayed as text via a terminal monitor. Configures and displays ACL information. 1 Command Groups Introduction The Command Line Interface (CLI) is a network management application operated through a Telnet session....Command Groups Command Group Layer 2 Commands AAA ACL Description Configures connection security including authorization and passwords. A switch can be completed before using this document. The CLI is structured, describes the command syntax, and describes the command functionality. Command Groups 55 This guide also provides information for configuring the PowerConnect...
Command Line Interface Guide
Page 135
... implement its major functions. For example, in place of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. To see what commands are not displayed. Two instances where the help messages is entered in the command show interfaces status ethernet 1/g5, show, interfaces and status are : • Keyword lookup...
... implement its major functions. For example, in place of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. To see what commands are not displayed. Two instances where the help messages is entered in the command show interfaces status ethernet 1/g5, show, interfaces and status are : • Keyword lookup...
Command Line Interface Guide
Page 138
... history buffer Print last deleted character Enables serial flow Disables serial flow Return to root command prompt Command-line completion Return to the root command prompt Go to next lower command prompt List choices Operating on Multiple Objects (Range) The CLI allows the user to operate...for range operation: • Operations on which to the end of the line. Keyboard Key + + + + + + + + + + + + + + + + end exit Description Delete previous character Go to beginning of line Go to end of line Go forward one character Go backward one character Delete current character Delete to beginning...
... history buffer Print last deleted character Enables serial flow Disables serial flow Return to root command prompt Command-line completion Return to the root command prompt Go to next lower command prompt List choices Operating on Multiple Objects (Range) The CLI allows the user to operate...for range operation: • Operations on which to the end of the line. Keyboard Key + + + + + + + + + + + + + + + + end exit Description Delete previous character Go to beginning of line Go to end of line Go forward one character Go backward one character Delete current character Delete to beginning...
Command Line Interface Guide
Page 140
... example, xg2 is identified by the Unit# followed by a symbol and then the Interface ID. One option must be selected. all commands. For example, 2/g10 identifies the gigabit port 10 within the stack. • Interface ID - For example, 2/g10 identifies the ... the unit number is formed by the interface type followed by the | character. Convention Description [ ] In a command line, square brackets indicate an optional entry. { } In a command line inclusive brackets indicate a selection of switches are as follows: • Unit#/Interface ID - is used in CLI...
... example, xg2 is identified by the Unit# followed by a symbol and then the Interface ID. One option must be selected. all commands. For example, 2/g10 identifies the gigabit port 10 within the stack. • Interface ID - For example, 2/g10 identifies the ... the unit number is formed by the interface type followed by the | character. Convention Description [ ] In a command line, square brackets indicate an optional entry. { } In a command line inclusive brackets indicate a selection of switches are as follows: • Unit#/Interface ID - is used in CLI...
Command Line Interface Guide
Page 143
...Modes Interface configuration modes are the Interface Configuration and other specific configuration modes: • MST - The Global Configuration mode command line is used to enter into the IPv6 DHCP Pool mode. • Management Access List - Using the CLI 143 Contains... commands to enter the Line Interface mode. • VLAN Database - Global configuration mode command ipv6 router ospf is used to enter into the Router OSPFv3 Configuration mode. • IPv6 DHCP Pool...
...Modes Interface configuration modes are the Interface Configuration and other specific configuration modes: • MST - The Global Configuration mode command line is used to enter into the IPv6 DHCP Pool mode. • Management Access List - Using the CLI 143 Contains... commands to enter the Line Interface mode. • VLAN Database - Global configuration mode command ipv6 router ospf is used to enter into the Router OSPFv3 Configuration mode. • IPv6 DHCP Pool...
Command Line Interface Guide
Page 189
... of authentication are used only if the previous method returns an error, not if it fails. aaa authentication dot1x Use the aaa authentication dot1x command in the command line. Command Mode Global Configuration mode User Guidelines The additional methods of all methods return an error, specify none as the final method in Global Configuration...
... of authentication are used only if the previous method returns an error, not if it fails. aaa authentication dot1x Use the aaa authentication dot1x command in the command line. Command Mode Global Configuration mode User Guidelines The additional methods of all methods return an error, specify none as the final method in Global Configuration...
Command Line Interface Guide
Page 191
... an error, not if it fails. The additional methods of authentication methods activated when a user logs in. (Range: 1-12 characters) AAA Commands 191 Note that the authentication succeeds even if all methods return an error, specify none as the final method in . • list-name...login. The method argument identifies the list of methods when a user logs in the command line. console(config)# aaa authentication enable default enable aaa authentication login Use the aaa authentication login command in the given sequence. The login user ID is the requested privilege level. Uses ...
... an error, not if it fails. The additional methods of authentication methods activated when a user logs in. (Range: 1-12 characters) AAA Commands 191 Note that the authentication succeeds even if all methods return an error, specify none as the final method in . • list-name...login. The method argument identifies the list of methods when a user logs in the command line. console(config)# aaa authentication enable default enable aaa authentication login Use the aaa authentication login command in the given sequence. The login user ID is the requested privilege level. Uses ...
Command Line Interface Guide
Page 192
...Uses the list of all RADIUS servers for authentication. Command Mode Global Configuration mode User Guidelines The default and optional list names created with the login authentication command. To ensure that the authentication algorithm tries, in the command line. For example, if none is used with the aaa... authentication login command are used by telnet and SSH and only contains the ...
...Uses the list of all RADIUS servers for authentication. Command Mode Global Configuration mode User Guidelines The default and optional list names created with the login authentication command. To ensure that the authentication algorithm tries, in the command line. For example, if none is used with the aaa... authentication login command are used by telnet and SSH and only contains the ...
Command Line Interface Guide
Page 196
... authentication. console(config)# ip http authentication radius local ip https authentication Use the ip https authentication command in the command line. Uses the list of this command. Command Mode Global Configuration mode User Guidelines The additional methods of all methods return an error, specify none... as the command ip http authentication local. This action has the same effect as the final ...
... authentication. console(config)# ip http authentication radius local ip https authentication Use the ip https authentication command in the command line. Uses the list of this command. Command Mode Global Configuration mode User Guidelines The additional methods of all methods return an error, specify none... as the command ip http authentication local. This action has the same effect as the final ...
Command Line Interface Guide
Page 197
... authentication. To ensure that the authentication succeeds even if all TACACS+ servers for a line (console, telnet, or SSH). If none is checked. console(config)# ip https authentication radius local login authentication Use the login authentication command in the command line. Default Configuration The local user database is specified as an authentication method after radius...
... authentication. To ensure that the authentication succeeds even if all TACACS+ servers for a line (console, telnet, or SSH). If none is checked. console(config)# ip https authentication radius local login authentication Use the login authentication command in the command line. Default Configuration The local user database is specified as an authentication method after radius...
Command Line Interface Guide
Page 1053
... Commands • Configuration and Image File Commands • Denial of Service Commands • Line Commands • Management ACL Commands • Password Management Commands • PHY Diagnostics Commands • Power Over Ethernet Commands • RMON Commands • Serviceability Tracing Packet Commands • Sflow Commands • SNMP Commands • SSH Commands • Syslog Commands • System Management Commands • Telnet Server Commands • User Interface Commands • Web Server Commands Autoconfig Commands...
... Commands • Configuration and Image File Commands • Denial of Service Commands • Line Commands • Management ACL Commands • Password Management Commands • PHY Diagnostics Commands • Power Over Ethernet Commands • RMON Commands • Serviceability Tracing Packet Commands • Sflow Commands • SNMP Commands • SSH Commands • Syslog Commands • System Management Commands • Telnet Server Commands • User Interface Commands • Web Server Commands Autoconfig Commands...
Command Line Interface Guide
Page 1115
... configuration file having precedence. Specifically, if the following topics contain copy character descriptions. The following conditions exist, you can serve as if the commands were typed in the command-line interface (CLI). Use the copy startupconfig destination-url command to copy the startup configuration file to the device startup configuration. Configuration and Image File...
... configuration file having precedence. Specifically, if the following topics contain copy character descriptions. The following conditions exist, you can serve as if the commands were typed in the command-line interface (CLI). Use the copy startupconfig destination-url command to copy the startup configuration file to the device startup configuration. Configuration and Image File...
Command Line Interface Guide
Page 1251
.... 2 For stackable systems, configure your own EngineID, and verify that is unique within an administrative domain, the following example configures the Engine ID automatically. The command line password is erased, then SNMPv3 cannot be used. Since the EngineID should be reconfigured. console(config)# snmp-server engineID local default snmp-server filter Use...
.... 2 For stackable systems, configure your own EngineID, and verify that is unique within an administrative domain, the following example configures the Engine ID automatically. The command line password is erased, then SNMPv3 cannot be used. Since the EngineID should be reconfigured. console(config)# snmp-server engineID local default snmp-server filter Use...
User's Guide
Page 20
...." CDP Interoperability Allows the PowerConnect switch to interoperate with severity codes and timestamps. Auto Config Auto Config is a software feature which interoperates with Cisco network equipment and is granted. The switch contains an embedded web server that serves HTML pages you can display configuration files through command-line interface (CLI) commands. You can use...
...." CDP Interoperability Allows the PowerConnect switch to interoperate with severity codes and timestamps. Auto Config Auto Config is a software feature which interoperates with Cisco network equipment and is granted. The switch contains an embedded web server that serves HTML pages you can display configuration files through command-line interface (CLI) commands. You can use...
User's Guide
Page 21
... For more information about Real Time Clock, see "Configuring SNTP Settings." For information about SNTP, see "Clock Detail." Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as possible to examine and possibly modify these values. Context-sensitive help... clock time synchronization up to a set the time and date for current commands, and the CLI interpreter provides command and keyword completion. Trivial File Transfer Protocol (TFTP) The PowerConnect 6200 Series switches support boot image, firmware, and configuration upload or download ...
... For more information about Real Time Clock, see "Configuring SNTP Settings." For information about SNTP, see "Clock Detail." Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as possible to examine and possibly modify these values. Context-sensitive help... clock time synchronization up to a set the time and date for current commands, and the CLI interpreter provides command and keyword completion. Trivial File Transfer Protocol (TFTP) The PowerConnect 6200 Series switches support boot image, firmware, and configuration upload or download ...
User's Guide
Page 26
AFS, which is located on the Dell Support website at www.support.dell.com/manuals. Packets are used for isolating Layer 2 traffic for assigning traffic to a VLAN based on either the VLAN tag or a combination of these services. ... cut-through mode, is enabled, the memory management unit (MMU) can be assigned to Guest VLANs or Voice VLANs. When ASF is configurable through the command-line interface. Link Dependency Features The link dependency feature provides the ability to the egress port before it accesses the switch. Port-Based VLANs Port-based...
AFS, which is located on the Dell Support website at www.support.dell.com/manuals. Packets are used for isolating Layer 2 traffic for assigning traffic to a VLAN based on either the VLAN tag or a combination of these services. ... cut-through mode, is enabled, the memory management unit (MMU) can be assigned to Guest VLANs or Voice VLANs. When ASF is configurable through the command-line interface. Link Dependency Features The link dependency feature provides the ability to the egress port before it accesses the switch. Port-Based VLANs Port-based...
User's Guide
Page 38
... It also describes the installation and initial configuration procedures. • CLI Reference Guide-provides information about the command-line interface (CLI) commands used to a device. The document provides in a typical network. TACACS+ provides a centralized user management ...+ provides centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about configuring those functions using the command line interface (CLI). 38 Introduction
... It also describes the installation and initial configuration procedures. • CLI Reference Guide-provides information about the command-line interface (CLI) commands used to a device. The document provides in a typical network. TACACS+ provides a centralized user management ...+ provides centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about configuring those functions using the command line interface (CLI). 38 Introduction
User's Guide
Page 87
... the User EXEC mode and privileged EXEC mode displays the keyboard short cuts. print last deleted character Ctrl-Z .... enables serial flow Ctrl-S .... list choices Configuring Dell PowerConnect 87 go to next lower command prompt ? .... delete to next line in history buffer Ctrl-R .... delete previous character Ctrl-A .... delete previous word Ctrl-T .... go to beginning of...
... the User EXEC mode and privileged EXEC mode displays the keyboard short cuts. print last deleted character Ctrl-Z .... enables serial flow Ctrl-S .... list choices Configuring Dell PowerConnect 87 go to next lower command prompt ? .... delete to next line in history buffer Ctrl-R .... delete previous character Ctrl-A .... delete previous word Ctrl-T .... go to beginning of...
Getting Started Guide
Page 14
... all configuration settings specified will use the default values). www.dell.com | support.dell.com Initial Configuration NOTE: The initial simple configuration procedure is based on the following assumptions: • The PowerConnect switch was never configured before and is in the same state... automatically starts when the switch configuration file is not configured with a valid password. You can perform the initial configuration using the Command Line Interface (CLI). NOTE: All of the settings below are necessary to allow the remote management of a VT100 terminal or terminal...
... all configuration settings specified will use the default values). www.dell.com | support.dell.com Initial Configuration NOTE: The initial simple configuration procedure is based on the following assumptions: • The PowerConnect switch was never configured before and is in the same state... automatically starts when the switch configuration file is not configured with a valid password. You can perform the initial configuration using the Command Line Interface (CLI). NOTE: All of the settings below are necessary to allow the remote management of a VT100 terminal or terminal...
Getting Started Guide
Page 18
... Guide If the switch software versions do so automatically. Once Stack ID assignment is assigned a Stack ID. You can use the command line interface or the Web interface to make sure that all of the Master Switch. See the CLI Reference Manual and the User's Guide...When a stack is formed, a topology discovery process builds up a database that is created, one switch automatically becomes the master switch. www.dell.com | support.dell.com Managing a Stack Master and Member Switches A stack of switches can be managed from a web-based interface, an SNMP management station, or...
... Guide If the switch software versions do so automatically. Once Stack ID assignment is assigned a Stack ID. You can use the command line interface or the Web interface to make sure that all of the Master Switch. See the CLI Reference Manual and the User's Guide...When a stack is formed, a topology discovery process builds up a database that is created, one switch automatically becomes the master switch. www.dell.com | support.dell.com Managing a Stack Master and Member Switches A stack of switches can be managed from a web-based interface, an SNMP management station, or...