Command Line Interface Guide
Page 88
dot1x re-authenticate Manually initiates a re-authentication of the client. dot1x timeout servertimeout Sets the number of seconds the switch waits for IC a response to an EAP-request/identify ... Groups dot1x re-authentication Enables periodic re-authentication of all PE 802.1x-enabled ports or a specified 802.1X enabled port. dot1x port-control Enables manual control of the authorization IC state of seconds between re- GC dot1x timeout quiet-period Sets the number of seconds the switch remains IC in...
dot1x re-authenticate Manually initiates a re-authentication of the client. dot1x timeout servertimeout Sets the number of seconds the switch waits for IC a response to an EAP-request/identify ... Groups dot1x re-authentication Enables periodic re-authentication of all PE 802.1x-enabled ports or a specified 802.1X enabled port. dot1x port-control Enables manual control of the authorization IC state of seconds between re- GC dot1x timeout quiet-period Sets the number of seconds the switch remains IC in...
Command Line Interface Guide
Page 128
... generate dsa Generates DSA key pairs for incoming GC SSH sessions. GC crypto key generate rsa Generates RSA key pairs for the switch. key-string Manually specifies a SSH public key. show crypto key mypubkey Displays its own SSH public keys stored on page 60. GC snmp-server group Configures a new SNMP...
... generate dsa Generates DSA key pairs for incoming GC SSH sessions. GC crypto key generate rsa Generates RSA key pairs for the switch. key-string Manually specifies a SSH public key. show crypto key mypubkey Displays its own SSH public keys stored on page 60. GC snmp-server group Configures a new SNMP...
Command Line Interface Guide
Page 129
... Specifies the port number of logging and the syslog PE messages stored in the logging file. PE user-key Specifies which SSH public key is manually SP configured and enters the SSH public key-string configuration command. Clears messages from the internal logging PE buffer. Controls error messages logging. GC Limits...
... Specifies the port number of logging and the syslog PE messages stored in the logging file. PE user-key Specifies which SSH public key is manually SP configured and enters the SSH public key-string configuration command. Clears messages from the internal logging PE buffer. Controls error messages logging. GC Limits...
Command Line Interface Guide
Page 135
... within an Interface Configuration, the CLI provides a method of displaying the available commands, the command syntax requirements and in place of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. The key is entered...
... within an Interface Configuration, the CLI provides a method of displaying the available commands, the command syntax requirements and in place of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. The key is entered...
Command Line Interface Guide
Page 144
...Key-chain configuration mode. • SSH Public Key-string - The Global Configuration mode command interface port-channel is used to manually specify the SSH Public-key of class creation/deletion and matching commands. The Global Configuration mode command interface loopback enters the ...Loopback Configuration mode to manually specify other switch SSH public keys. Contains commands to configure an loopback type interface. • SSH Public Key-chain - This...
...Key-chain configuration mode. • SSH Public Key-string - The Global Configuration mode command interface port-channel is used to manually specify the SSH Public-key of class creation/deletion and matching commands. The Global Configuration mode command interface loopback enters the ...Loopback Configuration mode to manually specify other switch SSH public keys. Contains commands to configure an loopback type interface. • SSH Public Key-chain - This...
Command Line Interface Guide
Page 159
... wizard (you must respond to the next question to this account. For more information on adding management systems, see the user documentation). You can use Dell Network Manager or other SNMP accounts. (For more information on setting up an SNMP version 1 or 3 account, see the user documentation. o Return later and setup... CLI 159 You can skip the setup wizard, and enter CLI mode to add additional management system later. You must answer this setting, and to manually configure the switch.
... wizard (you must respond to the next question to this account. For more information on adding management systems, see the user documentation). You can use Dell Network Manager or other SNMP accounts. (For more information on setting up an SNMP version 1 or 3 account, see the user documentation. o Return later and setup... CLI 159 You can skip the setup wizard, and enter CLI mode to add additional management system later. You must answer this setting, and to manually configure the switch.
Command Line Interface Guide
Page 162
Unit 1 - Waiting to manually configure the switch. Welcome to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you like to run the setup wizard within 60 seconds)? [Y/N] y ... you like to setup the SNMP management interface now? [Y/N] n Step 2: Now we need to the CLI and Web interface. This account is not setup for Dell Network Manager) you must respond to the next question to run the setup wizard (you can skip the setup wizard, and enter CLI mode to...
Unit 1 - Waiting to manually configure the switch. Welcome to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you like to run the setup wizard within 60 seconds)? [Y/N] y ... you like to setup the SNMP management interface now? [Y/N] n Step 2: Now we need to the CLI and Web interface. This account is not setup for Dell Network Manager) you must respond to the next question to run the setup wizard (you can skip the setup wizard, and enter CLI mode to...
Command Line Interface Guide
Page 178
...mode. Applying Interface configuration, please wait ... Would you like to run the setup wizard (you must respond to the next question to manually configure the switch. console> console> console> console>show switch Management Preconfig Switch Code 178 Using the CLI Plugged-in You will continue ...with normal operation using Dell Easy Set up and running as quickly as possible. You can exit the setup wizard at any point by entering [ctrl+z]. gets ...
...mode. Applying Interface configuration, please wait ... Would you like to run the setup wizard (you must respond to the next question to manually configure the switch. console> console> console> console>show switch Management Preconfig Switch Code 178 Using the CLI Plugged-in You will continue ...with normal operation using Dell Easy Set up and running as quickly as possible. You can exit the setup wizard at any point by entering [ctrl+z]. gets ...
Command Line Interface Guide
Page 622
Command Mode Privileged EXEC mode 622 802.1x Commands When configuring a port to enable manually initiating a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port. Syntax dot1x re-authenticate [ethernet interface] • interface - The ...
Command Mode Privileged EXEC mode 622 802.1x Commands When configuring a port to enable manually initiating a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port. Syntax dot1x re-authenticate [ethernet interface] • interface - The ...
Command Line Interface Guide
Page 623
User Guidelines This command has no user guidelines. Example The following command manually initiates a re-authentication of the client. Example The following example enables periodic re-authentication of the 802.1xenabled port. console(config)# interface ethernet 1/g16 console(...
User Guidelines This command has no user guidelines. Example The following command manually initiates a re-authentication of the client. Example The following example enables periodic re-authentication of the 802.1xenabled port. console(config)# interface ethernet 1/g16 console(...
Command Line Interface Guide
Page 902
... configure the system to take routes learned from a non-OSPF source and advertise them to terminate the LSA Checking helper relationship if a topology change , and Manual clear. Redistributing This field is the sum for all neighbors' retransmit lists at any given time.
... configure the system to take routes learned from a non-OSPF source and advertise them to terminate the LSA Checking helper relationship if a topology change , and Manual clear. Redistributing This field is the sum for all neighbors' retransmit lists at any given time.
Command Line Interface Guide
Page 970
... Shows the sum of the LS checksums of LSAs link state database. Possible values are Not attempted, In progress, Completed, Timed out, Topology change, and Manual clear. 970 OSPFv3 Commands External LSA Count Shows the number of LSAs that have been in the link-state database. LSA High Water The maximum...
... Shows the sum of the LS checksums of LSAs link state database. Possible values are Not attempted, In progress, Completed, Timed out, Topology change, and Manual clear. 970 OSPFv3 Commands External LSA Count Shows the number of LSAs that have been in the link-state database. LSA High Water The maximum...
Command Line Interface Guide
Page 1173
... level at which lower priority ports are 370W and 350W respectively. 37W is approximately 11 percent of this command. As specified in the Serial Communication Manual for the 6224P and 6248P are disconnected has the configurable range from PowerDSine, 06-0032-056 UGPD63000 Serial Communication Protocol v5 2, Section 4.5.8, the power limit...
... level at which lower priority ports are 370W and 350W respectively. 37W is approximately 11 percent of this command. As specified in the Serial Communication Manual for the 6224P and 6248P are disconnected has the configurable range from PowerDSine, 06-0032-056 UGPD63000 Serial Communication Protocol v5 2, Section 4.5.8, the power limit...
Command Line Interface Guide
Page 1265
... RSA keys when you issue this command has no user guidelines. Default Configuration RSA key pairs do not exist. they are warned and prompted to manually specify public keys such as SSH client public keys. RSA keys, along with other switch credentials, are distributed to all units in order to replace...
... RSA keys when you issue this command has no user guidelines. Default Configuration RSA key pairs do not exist. they are warned and prompted to manually specify public keys such as SSH client public keys. RSA keys, along with other switch credentials, are distributed to all units in order to replace...
Command Line Interface Guide
Page 1268
... disable this command. The UU-encoded DER format is enabled by default. Example The following example enables the switch to specify an SSH public key manually. console(config)#ip ssh server key-string Use the key-string SSH Public Key Configuration mode to be configured from SSH. ip ssh server Use...
... disable this command. The UU-encoded DER format is enabled by default. Example The following example enables the switch to specify an SSH public key manually. console(config)#ip ssh server key-string Use the key-string SSH Public Key Configuration mode to be configured from SSH. ip ssh server Use...
Command Line Interface Guide
Page 1274
... bob rsa console(config-pubkey-key)# 1274 SSH Commands user-key Use the user-key command in SSH Public Key Chain Configuration mode to be manually configured for the SSH public key chain called "bob." Syntax user-key username {rsa|dsa} no user guidelines. Example The following example enables a SSH public... you are no form of this command. To remove a SSH public key, use the no keys. DSA key Default Configuration By default, there are configuring manually. Specifies the remote SSH client username. (Range: 1-48 characters) • rsa -
... bob rsa console(config-pubkey-key)# 1274 SSH Commands user-key Use the user-key command in SSH Public Key Chain Configuration mode to be manually configured for the SSH public key chain called "bob." Syntax user-key username {rsa|dsa} no user guidelines. Example The following example enables a SSH public... you are no form of this command. To remove a SSH public key, use the no keys. DSA key Default Configuration By default, there are configuring manually. Specifies the remote SSH client username. (Range: 1-48 characters) • rsa -
Command Line Interface Guide
Page 1297
Syntax hostname name no user guidelines. The name of the host. (Range: 1-255 characters) Default Configuration Host name not configured. console(config)# hostname Dell initiate failover To manually force a failover from the next reload of Switch/Stack. System Management Commands 1297 Command Mode Global Configuration mode User Guidelines This command has no hostname...
Syntax hostname name no user guidelines. The name of the host. (Range: 1-255 characters) Default Configuration Host name not configured. console(config)# hostname Dell initiate failover To manually force a failover from the next reload of Switch/Stack. System Management Commands 1297 Command Mode Global Configuration mode User Guidelines This command has no hostname...
User's Guide
Page 26
... a packet to Guest VLANs or Voice VLANs. For information about how to enable or disable one or more ports based on the Dell Support website at www.support.dell.com/manuals. Port-Based VLANs Port-based VLANs classify incoming packets to a VLAN based on the Cell Buffer Pool (CBP) memory. When ASF is...
... a packet to Guest VLANs or Voice VLANs. For information about how to enable or disable one or more ports based on the Dell Support website at www.support.dell.com/manuals. Port-Based VLANs Port-based VLANs classify incoming packets to a VLAN based on the Cell Buffer Pool (CBP) memory. When ASF is...
User's Guide
Page 37
... authentication allows multiple supplicants connected to the same port to reach network resources. For more information about defining ACLs, see "Password Management." Also supported are manually defined or learned on that only authorized users have access to specific resources while blocking off any neighboring multicast routers. Passwords for the network. The...
... authentication allows multiple supplicants connected to the same port to reach network resources. For more information about defining ACLs, see "Password Management." Also supported are manually defined or learned on that only authorized users have access to specific resources while blocking off any neighboring multicast routers. Passwords for the network. The...
User's Guide
Page 38
...configure and manage the switch and stack. The document provides in which the server maintains a user database that the PowerConnect 6200 Series provides and includes information about the switch models in a typical network. TACACS+ provides a centralized user management... RADIUS and other authentication processes. TACACS+ TACACS+ provides centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about configuring those functions using the ...
...configure and manage the switch and stack. The document provides in which the server maintains a user database that the PowerConnect 6200 Series provides and includes information about the switch models in a typical network. TACACS+ provides a centralized user management... RADIUS and other authentication processes. TACACS+ TACACS+ provides centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about configuring those functions using the ...