Command Line Interface Guide
Page 55
... guide also provides information for configuring the PowerConnect switch, details the procedures, and provides configuration examples. Basic installation configuration is a network management application operated through a Telnet session. System Command Groups Command Group Layer 2 Commands AAA ACL Description Configures connection security including authorization and passwords. 1 Command Groups Introduction The Command Line Interface (CLI) is described in the User...
... guide also provides information for configuring the PowerConnect switch, details the procedures, and provides configuration examples. Basic installation configuration is a network management application operated through a Telnet session. System Command Groups Command Group Layer 2 Commands AAA ACL Description Configures connection security including authorization and passwords. 1 Command Groups Introduction The Command Line Interface (CLI) is described in the User...
Command Line Interface Guide
Page 135
... Interface Configuration, the CLI provides a method of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. The key is a series of a command. It also explains how to request context-sensitive help messages is the key. Keywords identify a command and arguments specify configuration parameters. Using the CLI 135 A list of...
... Interface Configuration, the CLI provides a method of entering and editing the Dell PowerConnect 62xx Series Command Line Interface (CLI) commands and defines the command hierarchy. The key is a series of a command. It also explains how to request context-sensitive help messages is the key. Keywords identify a command and arguments specify configuration parameters. Using the CLI 135 A list of...
Command Line Interface Guide
Page 138
... history buffer Print last deleted character Enables serial flow Disables serial flow Return to root command prompt Command-line completion Return to the root command prompt Go to next lower command prompt List choices Operating on Multiple Objects (Range) The CLI allows the user to operate on which to ...identify the range of objects on the set of the line. The guidelines are as follows for range ...
... history buffer Print last deleted character Enables serial flow Disables serial flow Return to root command prompt Command-line completion Return to the root command prompt Go to next lower command prompt List choices Operating on Multiple Objects (Range) The CLI allows the user to operate on which to ...identify the range of objects on the set of the line. The guidelines are as follows for range ...
Command Line Interface Guide
Page 140
... g stands for gigabit Ethernet port (for naming interfaces in CLI commands are as follows: • Unit#/Interface ID - CLI Command Notation Conventions When entering commands there are certain command-entry notations which apply to form a virtual switch. Interface Naming ... the gigabit port 10 within the stack. • Interface Types - Convention Description [ ] In a command line, square brackets indicate an optional entry. { } In a command line inclusive brackets indicate a selection of compulsory parameters separated by a symbol and then the Interface ID. For ...
... g stands for gigabit Ethernet port (for naming interfaces in CLI commands are as follows: • Unit#/Interface ID - CLI Command Notation Conventions When entering commands there are certain command-entry notations which apply to form a virtual switch. Interface Naming ... the gigabit port 10 within the stack. • Interface Types - Convention Description [ ] In a command line, square brackets indicate an optional entry. { } In a command line inclusive brackets indicate a selection of compulsory parameters separated by a symbol and then the Interface ID. For ...
Command Line Interface Guide
Page 143
... as a whole. Global Configuration Mode Global Configuration commands apply to features that affect the system as line speed and timeout settings. The Global Configuration mode command line is used to enter the Line Interface mode. • VLAN Database - Contains commands to define management access administration lists. Global configuration mode command ipv6 dhcp pool is used to enter...
... as a whole. Global Configuration Mode Global Configuration commands apply to features that affect the system as line speed and timeout settings. The Global Configuration mode command line is used to enter the Line Interface mode. • VLAN Database - Contains commands to define management access administration lists. Global configuration mode command ipv6 dhcp pool is used to enter...
Command Line Interface Guide
Page 189
... aaa authentication dot1x default method1 no authentication. At least one from the following example uses the aaa authentication dot1x default command with no aaa authentication dot1x default • method1 - Command Mode Global Configuration mode User Guidelines The additional methods of all methods return an error, specify none as the final method...of authentication are used only if the previous method returns an error, not if it fails. aaa authentication dot1x Use the aaa authentication dot1x command in the command line. console(config)# aaa authentication dot1x default none AAA...
... aaa authentication dot1x default method1 no authentication. At least one from the following example uses the aaa authentication dot1x default command with no aaa authentication dot1x default • method1 - Command Mode Global Configuration mode User Guidelines The additional methods of all methods return an error, specify none as the final method...of authentication are used only if the previous method returns an error, not if it fails. aaa authentication dot1x Use the aaa authentication dot1x command in the command line. console(config)# aaa authentication dot1x default none AAA...
Command Line Interface Guide
Page 191
... of authentication methods activated when a user logs in the command line. Note that the authentication algorithm tries in the given sequence. For example, if none is specified as the final method in . (Range: 1-12 characters) AAA Commands 191 Example The following example sets authentication when accessing higher ...|list-name} method1 [method2...] no authentication method is defined. NOTE: Requests sent by entering the aaa authentication enable list-name method command where list-name is any character string used if the RADIUS server is down. The login user ID is now sent to TACACS+...
... of authentication methods activated when a user logs in the command line. Note that the authentication algorithm tries in the given sequence. For example, if none is specified as the final method in . (Range: 1-12 characters) AAA Commands 191 Example The following example sets authentication when accessing higher ...|list-name} method1 [method2...] no authentication method is defined. NOTE: Requests sent by entering the aaa authentication enable list-name method command where list-name is any character string used if the RADIUS server is down. The login user ID is now sent to TACACS+...
Command Line Interface Guide
Page 192
... authentication. Uses the list of all TACACS+ servers for authentication. To ensure that the authentication algorithm tries, in the command line. Specify at least one from the following example configures authentication login. 192 AAA Commands Uses the list of all RADIUS servers for authentication. "defaultList" is an authentication failure. The additional methods of...
... authentication. Uses the list of all TACACS+ servers for authentication. To ensure that the authentication algorithm tries, in the command line. Specify at least one from the following example configures authentication login. 192 AAA Commands Uses the list of all RADIUS servers for authentication. "defaultList" is an authentication failure. The additional methods of...
Command Line Interface Guide
Page 196
...ip https authentication Use the ip https authentication command in the command line. Uses no form of authentication are used if the RADIUS server is down. Command Mode Global Configuration mode User Guidelines The additional methods of this command. Keyword local none radius tacacs Source or ...server users. For example, if none is specified as an authentication method after radius, no ip https authentication 196 AAA Commands To return to specify authentication methods for authentication. To ensure that the authentication succeeds even if all methods return an error,...
...ip https authentication Use the ip https authentication command in the command line. Uses no form of authentication are used if the RADIUS server is down. Command Mode Global Configuration mode User Guidelines The additional methods of this command. Keyword local none radius tacacs Source or ...server users. For example, if none is specified as an authentication method after radius, no ip https authentication 196 AAA Commands To return to specify authentication methods for authentication. To ensure that the authentication succeeds even if all methods return an error,...
Command Line Interface Guide
Page 197
... down. This action has the same effect as the final method in Line Configuration mode to the default specified by the authentication login command, use the no authentication. Command Mode Global Configuration mode User Guidelines The additional methods of all TACACS+ ... method list for authentication. console(config)# ip https authentication radius local login authentication Use the login authentication command in the command line. Uses the list of this command. • method1 [method2...] - Example The following table: Keyword local none radius tacacs Source or ...
... down. This action has the same effect as the final method in Line Configuration mode to the default specified by the authentication login command, use the no authentication. Command Mode Global Configuration mode User Guidelines The additional methods of all TACACS+ ... method list for authentication. console(config)# ip https authentication radius local login authentication Use the login authentication command in the command line. Uses the list of this command. • method1 [method2...] - Example The following table: Keyword local none radius tacacs Source or ...
Command Line Interface Guide
Page 1053
... Commands • Configuration and Image File Commands • Denial of Service Commands • Line Commands • Management ACL Commands • Password Management Commands • PHY Diagnostics Commands • Power Over Ethernet Commands • RMON Commands • Serviceability Tracing Packet Commands • Sflow Commands • SNMP Commands • SSH Commands • Syslog Commands • System Management Commands • Telnet Server Commands • User Interface Commands • Web Server Commands Autoconfig Commands...
... Commands • Configuration and Image File Commands • Denial of Service Commands • Line Commands • Management ACL Commands • Password Management Commands • PHY Diagnostics Commands • Power Over Ethernet Commands • RMON Commands • Serviceability Tracing Packet Commands • Sflow Commands • SNMP Commands • SSH Commands • Syslog Commands • System Management Commands • Telnet Server Commands • User Interface Commands • Web Server Commands Autoconfig Commands...
Command Line Interface Guide
Page 1115
... running configuration as a backup copy. xmodem can only be copied to the device startup configuration. The following conditions exist, you can serve as if the commands were typed in the command-line interface (CLI). Copying a Configuration File from a Server to the Startup Configuration Use the copy source-url startup-config...
... running configuration as a backup copy. xmodem can only be copied to the device startup configuration. The following conditions exist, you can serve as if the commands were typed in the command-line interface (CLI). Copying a Configuration File from a Server to the Startup Configuration Use the copy source-url startup-config...
Command Line Interface Guide
Page 1251
...mode User Guidelines If you want to use SNMPv3, you need to an MD5 or SHA security digest. A user's password (entered on the command line) is based on both the password and the local engine ID. To remove the specified SNMP server filter entry, use the no form of this... deletion, if the local value of engineID changes, the security digests of this command. Syntax snmp-server filter filter-name oid-tree {included | excluded} SNMP Commands 1251 The command line password is erased, then SNMPv3 cannot be unique within your own EngineID, and verify that is unique...
...mode User Guidelines If you want to use SNMPv3, you need to an MD5 or SHA security digest. A user's password (entered on the command line) is based on both the password and the local engine ID. To remove the specified SNMP server filter entry, use the no form of this... deletion, if the local value of engineID changes, the security digests of this command. Syntax snmp-server filter filter-name oid-tree {included | excluded} SNMP Commands 1251 The command line password is erased, then SNMPv3 cannot be unique within your own EngineID, and verify that is unique...
User's Guide
Page 20
...of a TFTP server 3. For information about downloading configuration files, see "Defining SNTP Global Parameters." CDP Interoperability Allows the PowerConnect switch to share information between neighboring devices (routers, bridges, access servers, and switches). You can manage the system ...feature which interoperates with Cisco™ devices running CDP. Web Based Management You can display configuration files through command-line interface (CLI) commands. Configuration or assignment of an IP address for the device from the TFTP server Captive Portal Blocks clients from...
...of a TFTP server 3. For information about downloading configuration files, see "Defining SNTP Global Parameters." CDP Interoperability Allows the PowerConnect switch to share information between neighboring devices (routers, bridges, access servers, and switches). You can manage the system ...feature which interoperates with Cisco™ devices running CDP. Web Based Management You can display configuration files through command-line interface (CLI) commands. Configuration or assignment of an IP address for the device from the TFTP server Captive Portal Blocks clients from...
User's Guide
Page 21
...desired remote servers where they can be sent to a set the time and date for current commands, and the CLI interpreter provides command and keyword completion. Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as possible to the millisecond. CLI is ... "Configuring SNTP Settings." For information about SNTP, see "Software Download and Reboot." Trivial File Transfer Protocol (TFTP) The PowerConnect 6200 Series switches support boot image, firmware, and configuration upload or download through TFTP. Context-sensitive help provides format and value...
...desired remote servers where they can be sent to a set the time and date for current commands, and the CLI interpreter provides command and keyword completion. Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as possible to the millisecond. CLI is ... "Configuring SNTP Settings." For information about SNTP, see "Software Download and Reboot." Trivial File Transfer Protocol (TFTP) The PowerConnect 6200 Series switches support boot image, firmware, and configuration upload or download through TFTP. Context-sensitive help provides format and value...
User's Guide
Page 26
... port before it accesses the switch. Virtual Local Area Network Supported Features VLAN Support VLANs are defined on the Dell Support website at www.support.dell.com/manuals. Link Dependency Features The link dependency feature provides the ability to enable or disable one or more ports...of the link of the ingress port and packet contents. Protocol-based VLANs are classified as cut-through mode, is configurable through the command-line interface. Alternate Store and Forward (ASF) The Alternate Store and Forward (ASF) feature reduces latency for assigning traffic to Guest VLANs...
... port before it accesses the switch. Virtual Local Area Network Supported Features VLAN Support VLANs are defined on the Dell Support website at www.support.dell.com/manuals. Link Dependency Features The link dependency feature provides the ability to enable or disable one or more ports...of the link of the ingress port and packet contents. Protocol-based VLANs are classified as cut-through mode, is configurable through the command-line interface. Alternate Store and Forward (ASF) The Alternate Store and Forward (ASF) feature reduces latency for assigning traffic to Guest VLANs...
User's Guide
Page 38
.../server-based protocol in which the server maintains a user database that the PowerConnect 6200 Series provides and includes information about configuring those functions using the command line interface (CLI). 38 Introduction It also describes the installation and initial configuration ... centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about the command-line interface (CLI) commands used to use the PowerConnect 6200 Series in the ...
.../server-based protocol in which the server maintains a user database that the PowerConnect 6200 Series provides and includes information about configuring those functions using the command line interface (CLI). 38 Introduction It also describes the installation and initial configuration ... centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about the command-line interface (CLI) commands used to use the PowerConnect 6200 Series in the ...
User's Guide
Page 87
... mode displays the keyboard short cuts. go to end of line Ctrl-K .... go forward one character Ctrl-D .... enables serial flow Ctrl-S .... delete to next lower command prompt ? .... go backward one character Ctrl-B .... Advanced ...line Ctrl-W .... delete previous character Ctrl-A .... go to end of the help command: Console>help command in history buffer Ctrl-Y .... delete to root command prompt Ctrl-Q .... return to beginning of line Ctrl-F .... disables serial flow Tab, command-line completion Exit .... list choices Configuring Dell PowerConnect...
... mode displays the keyboard short cuts. go to end of line Ctrl-K .... go forward one character Ctrl-D .... enables serial flow Ctrl-S .... delete to next lower command prompt ? .... go backward one character Ctrl-B .... Advanced ...line Ctrl-W .... delete previous character Ctrl-A .... go to end of the help command: Console>help command in history buffer Ctrl-Y .... delete to root command prompt Ctrl-Q .... return to beginning of line Ctrl-F .... disables serial flow Tab, command-line completion Exit .... list choices Configuring Dell PowerConnect...
Getting Started Guide
Page 14
... from all configuration settings specified will use the default values). www.dell.com | support.dell.com Initial Configuration NOTE: The initial simple configuration procedure is based on the following assumptions: • The PowerConnect switch was never configured before and is in the same state as...allow the remote management of a VT100 terminal or terminal equivalent. Initial Configuration Procedure You can perform the initial configuration using the Command Line Interface (CLI). You may choose to skip this step if SNMP management is not used by the SNMP manager at any point...
... from all configuration settings specified will use the default values). www.dell.com | support.dell.com Initial Configuration NOTE: The initial simple configuration procedure is based on the following assumptions: • The PowerConnect switch was never configured before and is in the same state as...allow the remote management of a VT100 terminal or terminal equivalent. Initial Configuration Procedure You can perform the initial configuration using the Command Line Interface (CLI). You may choose to skip this step if SNMP management is not used by the SNMP manager at any point...
Getting Started Guide
Page 18
...Inter-switch stacking link failure • Switch insertion • Switch removal If the Master Switch goes off line, any of the Member Switches in the stack can use the command line interface or the Web interface to make sure that is complete, each switch saves its Stack ID into... versions do so automatically. Afterwards, you can be managed from a web-based interface, an SNMP management station, or a CLI. www.dell.com | support.dell.com Managing a Stack Master and Member Switches A stack of switches can manage the entire stack through the IP address of the Master Switch...
...Inter-switch stacking link failure • Switch insertion • Switch removal If the Master Switch goes off line, any of the Member Switches in the stack can use the command line interface or the Web interface to make sure that is complete, each switch saves its Stack ID into... versions do so automatically. Afterwards, you can be managed from a web-based interface, an SNMP management station, or a CLI. www.dell.com | support.dell.com Managing a Stack Master and Member Switches A stack of switches can manage the entire stack through the IP address of the Master Switch...