Command Line Interface (CLI) Guide (.htm)
Page 28
...Global Configuration Global Configuration Global Configuration User EXEC Privileged EXEC Privileged EXEC DELL CONFIDENTIAL - Enables the device to use the Simple Network Time Protocol (SNTP) to request and accept Simple Network Time Protocol (SNTP) traffic from servers. Sets the polling time for... time source for the Simple Network Time Protocol (SNTP) client. Enables anycast clients. FOR PROOF ONLY 28 Command Groups Configures the system to automatically switch to which Simple Network Time Protocol (SNTP) will synchronize. Enables the Simple Network Time Protocol (SNTP) client on...
...Global Configuration Global Configuration Global Configuration User EXEC Privileged EXEC Privileged EXEC DELL CONFIDENTIAL - Enables the device to use the Simple Network Time Protocol (SNTP) to request and accept Simple Network Time Protocol (SNTP) traffic from servers. Sets the polling time for... time source for the Simple Network Time Protocol (SNTP) client. Enables anycast clients. FOR PROOF ONLY 28 Command Groups Configures the system to automatically switch to which Simple Network Time Protocol (SNTP) will synchronize. Enables the Simple Network Time Protocol (SNTP) client on...
Command Line Interface (CLI) Guide (.htm)
Page 43
Switches to another node on the network. stack reload stack display-order Reloads stack members. Specifies the device asset-tag. show version asset-tag Displays information about the CPU utilization...Configuration Global Configuration Privileged EXEC Global Configuration User EXEC User EXEC User EXEC User EXEC User EXEC Global Configuration User EXEC Global Configuration Privileged EXEC DELL CONFIDENTIAL - Displays information about the active users. service cpu-utilization Enables measuring CPU utilization. System Management Commands Privileged EXEC Command Group ping ...
Switches to another node on the network. stack reload stack display-order Reloads stack members. Specifies the device asset-tag. show version asset-tag Displays information about the CPU utilization...Configuration Global Configuration Privileged EXEC Global Configuration User EXEC User EXEC User EXEC User EXEC User EXEC Global Configuration User EXEC Global Configuration Privileged EXEC DELL CONFIDENTIAL - Displays information about the active users. service cpu-utilization Enables measuring CPU utilization. System Management Commands Privileged EXEC Command Group ping ...
User's Guide (.htm)
Page 7
... Overview 212 Downloading Files 213 Uploading Files 215 Activating Image Files 218 Copying Files 219 Managing Device Files 221 Configuring General Settings 223 7 Configuring Switch Information Configuring Network Security 225 Port Based Authentication 225 Configuring Port Based Authentication 227 Configuring Advanced Port Based Authentication 231 Authenticating Users 235 Configuring Port Security 237...
... Overview 212 Downloading Files 213 Uploading Files 215 Activating Image Files 218 Copying Files 219 Managing Device Files 221 Configuring General Settings 223 7 Configuring Switch Information Configuring Network Security 225 Port Based Authentication 225 Configuring Port Based Authentication 227 Configuring Advanced Port Based Authentication 231 Authenticating Users 235 Configuring Port Security 237...
User's Guide (.htm)
Page 30
..., when they are sending Multicast frames. For more information, see "Enabling Storm Control." 30 Introduction www.dell.com | support.dell.com VLAN-aware MAC-based Switching The device always performs VLAN-aware bridging. However, a similar functionality can be configured for Multicast sessions, ...is a limited broadcast service, which target port receives copies of the relevant VLAN. Port Mirroring Port mirroring monitors and mirrors network traffic by the device from where copies of Multicast and Broadcast frames accepted and forwarded by the device. For more information, ...
..., when they are sending Multicast frames. For more information, see "Enabling Storm Control." 30 Introduction www.dell.com | support.dell.com VLAN-aware MAC-based Switching The device always performs VLAN-aware bridging. However, a similar functionality can be configured for Multicast sessions, ...is a limited broadcast service, which target port receives copies of the relevant VLAN. Port Mirroring Port mirroring monitors and mirrors network traffic by the device from where copies of Multicast and Broadcast frames accepted and forwarded by the device. For more information, ...
User's Guide (.htm)
Page 34
... Syslog is assigned the DNS service translates the name into IP addresses. SNTP The Simple Network Time Protocol (SNTP) assures accurate network Ethernet Switch clock time synchronization up to a set of these events for after-the-fact usage. DNS... servers maintain domain name databases and their corresponding IP addresses. The system sends notifications of significant events in real time, and keeps a record of remote servers, where they can be captured across the entire network. www.dell...
... Syslog is assigned the DNS service translates the name into IP addresses. SNTP The Simple Network Time Protocol (SNTP) assures accurate network Ethernet Switch clock time synchronization up to a set of these events for after-the-fact usage. DNS... servers maintain domain name databases and their corresponding IP addresses. The system sends notifications of significant events in real time, and keeps a record of remote servers, where they can be captured across the entire network. www.dell...
User's Guide (.htm)
Page 61
...information from the network administrator before and is in the same state as when you received it. • The PowerConnect device booted successfully. • The console connection is established and the console prompt is displayed: Welcome to use the Setup Wizard. Configuring PowerConnect 3424/P and 3448... as quickly as possible. The initial device configuration is prompted to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you through the initial switch configuration, and gets the system up and running as quickly as possible...
...information from the network administrator before and is in the same state as when you received it. • The PowerConnect device booted successfully. • The console connection is established and the console prompt is displayed: Welcome to use the Setup Wizard. Configuring PowerConnect 3424/P and 3448... as quickly as possible. The initial device configuration is prompted to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you through the initial switch configuration, and gets the system up and running as quickly as possible...
User's Guide (.htm)
Page 62
... a default answer; You must respond to the next question to run the setup wizard within 60 seconds? (Y/N)[Y]Y You can use Dell Network Manager or CLI to change this setting, and to add additional management systems. For more information on adding management systems, see the...account now. • Return later and setup additional SNMP v1/v3 accounts. To add a management station: 62 Configuring PowerConnect 3424/P and 3448/P Enter [Y] to access the switch. Would you must specify the management system IP address and the "community string" or password that the particular management ...
... a default answer; You must respond to the next question to run the setup wizard within 60 seconds? (Y/N)[Y]Y You can use Dell Network Manager or CLI to change this setting, and to add additional management systems. For more information on adding management systems, see the...account now. • Return later and setup additional SNMP v1/v3 accounts. To add a management station: 62 Configuring PowerConnect 3424/P and 3448/P Enter [Y] to access the switch. Would you must specify the management system IP address and the "community string" or password that the particular management ...
User's Guide (.htm)
Page 82
...help that page displays when Help is clicked. Opens the Log Out window. Moves information between lists. Prints the Network Management System page and/or table information. Device Management Buttons Device Management buttons provide an easy method of configuring device... a Telnet session. Creates statistics charts on the OpenManage Switch Administrator interface. Contains the version and build number and Dell copyright information. Displays the device tables. www.dell.com | support.dell.com Using the Switch Administrator Buttons This section describes the buttons found on -...
...help that page displays when Help is clicked. Opens the Log Out window. Moves information between lists. Prints the Network Management System page and/or table information. Device Management Buttons Device Management buttons provide an easy method of configuring device... a Telnet session. Creates statistics charts on the OpenManage Switch Administrator interface. Contains the version and build number and Dell copyright information. Displays the device tables. www.dell.com | support.dell.com Using the Switch Administrator Buttons This section describes the buttons found on -...
User's Guide (.htm)
Page 84
...supports up to four simultaneous Telnet sessions to the local device through a TCP/IP protocol network. During the CLI session initialization, the CLI mode is not required. 84 Using Dell OpenManage Switch Administrator The Interface Configuration mode configures the device at the terminal prompt displays a list of... level called the Subinterface Configuration mode. The Global Configuration mode manages the device configuration on a global level. www.dell.com | support.dell.com Telnet Connection Telnet is divided into command modes. To start a Telnet session: 1 Select Start > Run.
...supports up to four simultaneous Telnet sessions to the local device through a TCP/IP protocol network. During the CLI session initialization, the CLI mode is not required. 84 Using Dell OpenManage Switch Administrator The Interface Configuration mode configures the device at the terminal prompt displays a list of... level called the Subinterface Configuration mode. The Global Configuration mode manages the device configuration on a global level. www.dell.com | support.dell.com Telnet Connection Telnet is divided into command modes. To start a Telnet session: 1 Select Start > Run.
User's Guide (.htm)
Page 88
...- Asset The Asset page contains the following fields: System Name (0-159 Characters) - System Contact (0-159 Characters) - Indicates the name of the network management subsystem contained in the entity. The format is day, month, year, for configuring and viewing general device information, including the system name, ... Asset page, click System →General →Asset in the evening. 88 Configuring System Information MAC Address - www.dell.com | support.dell.com Defining General Switch Information The General page contains links to pages that allow network managers to configure...
...- Asset The Asset page contains the following fields: System Name (0-159 Characters) - System Contact (0-159 Characters) - Indicates the name of the network management subsystem contained in the entity. The format is day, month, year, for configuring and viewing general device information, including the system name, ... Asset page, click System →General →Asset in the evening. 88 Configuring System Information MAC Address - www.dell.com | support.dell.com Defining General Switch Information The General page contains links to pages that allow network managers to configure...
User's Guide (.htm)
Page 107
...19) Boot version 1.0.0.0 (date 11-Jan-2005 time 11:48:21) HW version 1.0.0 Managing Stack Members The Stack Management page allows network managers to the Running Configuration file before resetting the device. This prevents the current device configuration from Unit 1 to the backup Master unit.... Second stack member number. For more information about saving Configuration files, see Managing Files. Switch Stack Control from being lost. Stack Management NOTE: Save all changes to either reset the entire stack or a specific device. First stack...
...19) Boot version 1.0.0.0 (date 11-Jan-2005 time 11:48:21) HW version 1.0.0 Managing Stack Members The Stack Management page allows network managers to the Running Configuration file before resetting the device. This prevents the current device configuration from Unit 1 to the backup Master unit.... Second stack member number. For more information about saving Configuration files, see Managing Files. Switch Stack Control from being lost. Stack Management NOTE: Save all changes to either reset the entire stack or a specific device. First stack...
User's Guide (.htm)
Page 110
...as a client, and cannot provide time services to other systems. The switch can poll the following time levels: • T1 - For example, a Stratum 2 server receives the time over a network path. Polling for Anycast information is used . The device is unknown... servers defined on the Time level and server type. The switch receives time from a Stratum 1 server. www.dell.com | support.dell.com Configuring SNTP Settings The switch supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network switch clock time synchronization up to a request for example, a ...
...as a client, and cannot provide time services to other systems. The switch can poll the following time levels: • T1 - For example, a Stratum 2 server receives the time over a network path. Polling for Anycast information is used . The device is unknown... servers defined on the Time level and server type. The switch receives time from a Stratum 1 server. www.dell.com | support.dell.com Configuring SNTP Settings The switch supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network switch clock time synchronization up to a request for example, a ...
User's Guide (.htm)
Page 189
...and SNMPv2 PDUs. Access rights to access the information over the network. In addition, a User Security Model (USM) is enabled. SNMPv3 can be enabled without authentication. • Timeliness - The switch supports SNMP notification filters based on if the Local Engine ID is...message, or both authentication and privacy are used for managing network devices. The SNMP agent compares incoming message to manage switch features. Defines key generation, key updates, and key use. Defining SNMP Parameters Simple Network Management Protocol (SNMP) provides a method for encryption. ...
...and SNMPv2 PDUs. Access rights to access the information over the network. In addition, a User Security Model (USM) is enabled. SNMPv3 can be enabled without authentication. • Timeliness - The switch supports SNMP notification filters based on if the Local Engine ID is...message, or both authentication and privacy are used for managing network devices. The SNMP agent compares incoming message to manage switch features. Defines key generation, key updates, and key use. Defining SNMP Parameters Simple Network Management Protocol (SNMP) provides a method for encryption. ...
User's Guide (.htm)
Page 225
...RADIUS server using the Extensible Authentication Protocol (EAP). Configuring Switch Information This section provides all attached hosts are authenticated via RADIUS servers. Configuring Network Security Use the Network Security page to access the system services. • ...Multicast Support. Port based authentication creates two access states: • Controlled Access - To open the Network Security page, select Switch →Network Security. Permits uncontrolled communication regardless of the authenticator, and indicates whether the supplicant is unauthorized, all ...
...RADIUS server using the Extensible Authentication Protocol (EAP). Configuring Switch Information This section provides all attached hosts are authenticated via RADIUS servers. Configuring Network Security Use the Network Security page to access the system services. • ...Multicast Support. Port based authentication creates two access states: • Controlled Access - To open the Network Security page, select Switch →Network Security. Permits uncontrolled communication regardless of the authenticator, and indicates whether the supplicant is unauthorized, all ...
User's Guide (.htm)
Page 226
www.dell.com | support.dell.com • Enables user based authentication. Advanced Port Based Authentication is enabled, the port receives limited network access. Only the authorized host can be attached to the network. • Guest VLANs - Provides limited network access authorized to access the network. ... Guest VLAN is implemented in the device are always available, even if specific ports attached to unauthorized users. 226 Configuring Switch Information If the host authentication fails, or an EAPOL-logoff message is not required can access the port. • ...
www.dell.com | support.dell.com • Enables user based authentication. Advanced Port Based Authentication is enabled, the port receives limited network access. Only the authorized host can be attached to the network. • Guest VLANs - Provides limited network access authorized to access the network. ... Guest VLAN is implemented in the device are always available, even if specific ports attached to unauthorized users. 226 Configuring Switch Information If the host authentication fails, or an EAPOL-logoff message is not required can access the port. • ...
User's Guide (.htm)
Page 227
... first via RADIUS server. Authentication Method - RADIUS - Indicates that no authentication method is used to configure port based authentication. Configuring Switch Information 227 Disables port based authentication on the device. If the port is not authenticated, then no authentication method is used . ... server. Permits port based authentication on the device. Figure 7-1. To open the Port Based Authentication page, click Switch →Network Security → Port Based Authentication. Configuring Port Based Authentication The Port Based Authentication page allows...
... first via RADIUS server. Authentication Method - RADIUS - Indicates that no authentication method is used to configure port based authentication. Configuring Switch Information 227 Disables port based authentication on the device. If the port is not authenticated, then no authentication method is used . ... server. Permits port based authentication on the device. Figure 7-1. To open the Port Based Authentication page, click Switch →Network Security → Port Based Authentication. Configuring Port Based Authentication The Port Based Authentication page allows...
User's Guide (.htm)
Page 231
For more information on Advanced Port Based Authentication, see Advanced Port Based Authentication. To open the Multiple Hosts, click Switch →Network Security →Multiple Hosts. Multiple Hosts Configuring Switch Information 231 The following is an example of the CLI commands: Console# show dot1x Interface --------1/e1 1/e2 1/e3 1/e4 Admin Mode ---------Auto Auto Auto...
For more information on Advanced Port Based Authentication, see Advanced Port Based Authentication. To open the Multiple Hosts, click Switch →Network Security →Multiple Hosts. Multiple Hosts Configuring Switch Information 231 The following is an example of the CLI commands: Console# show dot1x Interface --------1/e1 1/e2 1/e3 1/e4 Admin Mode ---------Auto Auto Auto...
User's Guide (.htm)
Page 235
The field format is Day:Hour:Minute:Seconds, for authentication, per user name. Configuring Switch Information 235 The User Access Lists are : Remote - Authenticated Users The Authenticated Users page contains the following fields: User Name - The amount of users authorized ... user was authenticated. Authentication Method - Figure 7-5. Port - Authenticating Users The Authenticated Users page displays user port access lists. To open the Authenticated Users page, click Switch →Network Security →Authenticated Users.
The field format is Day:Hour:Minute:Seconds, for authentication, per user name. Configuring Switch Information 235 The User Access Lists are : Remote - Authenticated Users The Authenticated Users page contains the following fields: User Name - The amount of users authorized ... user was authenticated. Authentication Method - Figure 7-5. Port - Authenticating Users The Authenticated Users page displays user port access lists. To open the Authenticated Users page, click Switch →Network Security →Authenticated Users.
User's Guide (.htm)
Page 237
Configuring Port Security Network security can be enhanced by limiting access on a specific port only to users with a trap • The port is shut down Locked port security also ... configuring port functionality including advanced features such as storm control and port mirroring, and for performing virtual port tests. Configuring Switch Information 237 To open the Port Security page, click Switch→ Network Security→Port Security. Unauthorized packets arriving to the system), the protection mechanism is not tied to that port up...
Configuring Port Security Network security can be enhanced by limiting access on a specific port only to users with a trap • The port is shut down Locked port security also ... configuring port functionality including advanced features such as storm control and port mirroring, and for performing virtual port tests. Configuring Switch Information 237 To open the Port Security page, click Switch→ Network Security→Port Security. Unauthorized packets arriving to the system), the protection mechanism is not tied to that port up...
User's Guide (.htm)
Page 396
...provides services to another computer over insecure channels. Manages LANs. SNTP assures accurate network switch clock time synchronization up to the millisecond. Secure Shell provides strong authentication and secure communications methods over a network, execute commands on a remote machine, and move files from one path between ...and ROM. An ASIC that allow a faster convergence of bridges. Segmentation eliminates LAN bandwidth limitations. Detects and uses network topologies that contains an entire system. www.dell.com | support.dell.com RSTP Rapid Spanning Tree Protocol.
...provides services to another computer over insecure channels. Manages LANs. SNTP assures accurate network switch clock time synchronization up to the millisecond. Secure Shell provides strong authentication and secure communications methods over a network, execute commands on a remote machine, and move files from one path between ...and ROM. An ASIC that allow a faster convergence of bridges. Segmentation eliminates LAN bandwidth limitations. Detects and uses network topologies that contains an entire system. www.dell.com | support.dell.com RSTP Rapid Spanning Tree Protocol.