Command Line Interface Guide
Page 88
... client before retransmitting the request. show dot1x clients Displays detailed information about the users PE who have successfully authenticated on the system or on the port. dot1x port-control Enables manual control of the authorization IC state of all PE 802.1x-enabled ports or...show dot1x Displays 802.1X status for IC a response from the authentication server before restarting the authentication process. dot1x re-authenticate Manually initiates a re-authentication of the port. dot1x timeout servertimeout Sets the number of seconds the switch waits for the switch or ...
... client before retransmitting the request. show dot1x clients Displays detailed information about the users PE who have successfully authenticated on the system or on the port. dot1x port-control Enables manual control of the authorization IC state of all PE 802.1x-enabled ports or...show dot1x Displays 802.1X status for IC a response from the authentication server before restarting the authentication process. dot1x re-authenticate Manually initiates a re-authentication of the port. dot1x timeout servertimeout Sets the number of seconds the switch waits for the switch or ...
Command Line Interface Guide
Page 128
...snmp-server location Sets the system location string. GC snmp-server group Configures a new SNMP group or a table that GC maps SNMP users to send SNMP traps when GC authentication authentication failed. GC snmp-server view Creates or updates a Simple Network GC Management Protocol (SNMP) ... views. GC crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration GC mode. SK show crypto key pubkey- key-string Manually specifies a SSH public key. Command Description Mode* snmp-server filter Creates or updates an SNMP server filter entry. GC crypto key ...
...snmp-server location Sets the system location string. GC snmp-server group Configures a new SNMP group or a table that GC maps SNMP users to send SNMP traps when GC authentication authentication failed. GC snmp-server view Creates or updates a Simple Network GC Management Protocol (SNMP) ... views. GC crypto key pubkey-chain ssh Enters SSH Public Key-chain configuration GC mode. SK show crypto key pubkey- key-string Manually specifies a SSH public key. Command Description Mode* snmp-server filter Creates or updates an SNMP server filter entry. GC crypto key ...
Command Line Interface Guide
Page 129
... PE Describes the syslog server. L Displays the state of logging and the syslog PE messages stored in the internal buffer. PE user-key Specifies which SSH public key is manually SP configured and enters the SSH public key-string configuration command. Enable CLI command logging GC Logs messages to the logging file...
... PE Describes the syslog server. L Displays the state of logging and the syslog PE messages stored in the internal buffer. PE user-key Specifies which SSH public key is manually SP configured and enters the SSH public key-string configuration command. Enable CLI command logging GC Logs messages to the logging file...
Command Line Interface Guide
Page 144
... Contains commands to configure an loopback type interface. • SSH Public Key-chain - The SSH Public-Key Chain Configuration mode command user-key command is used to enter the SSH Public Key-chain configuration mode. • SSH Public Key-string - The Global Configuration mode... command interface loopback enters the Loopback Configuration mode to manually specify other switch SSH public keys. Contains commands to manually specify the SSH Public-key of a remote SSH Client. This mode consists of these commands are...
... Contains commands to configure an loopback type interface. • SSH Public Key-chain - The SSH Public-Key Chain Configuration mode command user-key command is used to enter the SSH Public Key-chain configuration mode. • SSH Public Key-string - The Global Configuration mode... command interface loopback enters the Loopback Configuration mode to manually specify other switch SSH public keys. Contains commands to manually specify the SSH Public-key of a remote SSH Client. This mode consists of these commands are...
Command Line Interface Guide
Page 159
...this setting, and to add additional management system later. For more information on adding management systems, see the user documentation). You must answer this question within 60 seconds, otherwise the system will continue with normal operation using ... like to run the setup wizard within 60 seconds)? [Y/N] y Step 1: The system is not setup for Dell Network Manager) you must specify the management system IP address and the "community string" or password that the particular... To add a management station: Please enter the SNMP community string to manually configure the switch.
...this setting, and to add additional management system later. For more information on adding management systems, see the user documentation). You must answer this question within 60 seconds, otherwise the system will continue with normal operation using ... like to run the setup wizard within 60 seconds)? [Y/N] y Step 1: The system is not setup for Dell Network Manager) you must specify the management system IP address and the "community string" or password that the particular... To add a management station: Please enter the SNMP community string to manually configure the switch.
Command Line Interface Guide
Page 162
...at any point by default. Set up an SNMP version 1 or 3 account, see the user documentation. Return later and setup other accounts and change privilege levels later. Welcome to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you like... to setup the SNMP management interface now? [Y/N] n Step 2: Now we need to manually configure the switch. Would you like to run...
...at any point by default. Set up an SNMP version 1 or 3 account, see the user documentation. Return later and setup other accounts and change privilege levels later. Welcome to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you like... to setup the SNMP management interface now? [Y/N] n Step 2: Now we need to manually configure the switch. Would you like to run...
Command Line Interface Guide
Page 622
... default configuration. Specifies a valid interface number. Command Mode Privileged EXEC mode 622 802.1x Commands When configuring a port to enable manually initiating a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port. Syntax dot1x re-authenticate [ethernet interface]... must be in order to go immediately to the forwarding state after successful authentication. Command Mode Interface Configuration (Ethernet) mode User Guidelines It is auto. The full syntax is unit/port. Example The following command enables MAC-based authentication on 802.1x...
... default configuration. Specifies a valid interface number. Command Mode Privileged EXEC mode 622 802.1x Commands When configuring a port to enable manually initiating a re-authentication of all 802.1x-enabled ports or the specified 802.1x-enabled port. Syntax dot1x re-authenticate [ethernet interface]... must be in order to go immediately to the forwarding state after successful authentication. Command Mode Interface Configuration (Ethernet) mode User Guidelines It is auto. The full syntax is unit/port. Example The following command enables MAC-based authentication on 802.1x...
Command Line Interface Guide
Page 623
...dot1x re-authentication Use the dot1x re-authentication command in Interface Configuration mode to the default setting, use the no user guidelines. console(config)# interface ethernet 1/g16 console(config-if-1/g16)# dot1x re-authentication 802.1x Commands 623 Example The following...the client. Command Mode Interface Configuration (Ethernet) mode User Guidelines This command has no form of the 802.1xenabled port. Example The following command manually initiates a re-authentication of this command. User Guidelines This command has no dot1x re-authentication Default Configuration...
...dot1x re-authentication Use the dot1x re-authentication command in Interface Configuration mode to the default setting, use the no user guidelines. console(config)# interface ethernet 1/g16 console(config-if-1/g16)# dot1x re-authentication 802.1x Commands 623 Example The following...the client. Command Mode Interface Configuration (Ethernet) mode User Guidelines This command has no form of the 802.1xenabled port. Example The following command manually initiates a re-authentication of this command. User Guidelines This command has no dot1x re-authentication Default Configuration...
Command Line Interface Guide
Page 1265
... in the file system and the private key is never displayed to the user. Example The following example generates RSA key pairs. If your switch already has RSA keys when you are distributed to manually specify public keys such as SSH client public keys. they are not saved... in order to all units in a stack on a configuration save. Syntax crypto key pubkey-chain ssh Default Configuration By default, this command, you issue this command has no user guidelines. Command ...
... in the file system and the private key is never displayed to the user. Example The following example generates RSA key pairs. If your switch already has RSA keys when you are distributed to manually specify public keys such as SSH client public keys. they are not saved... in order to all units in a stack on a configuration save. Syntax crypto key pubkey-chain ssh Default Configuration By default, this command, you issue this command has no user guidelines. Command ...
Command Line Interface Guide
Page 1268
Command Mode Global Configuration mode User Guidelines To generate SSH server keys, use the no ip ssh server Default Configuration This command is the same format as the authorized keys file .... Syntax key-string key-string key-string row key-string • row - Example The following example enables the switch to specify an SSH public key manually. console(config)#ip ssh server key-string Use the key-string SSH Public Key Configuration mode to be configured from SSH. ip ssh server Use...
Command Mode Global Configuration mode User Guidelines To generate SSH server keys, use the no ip ssh server Default Configuration This command is the same format as the authorized keys file .... Syntax key-string key-string key-string row key-string • row - Example The following example enables the switch to specify an SSH public key manually. console(config)#ip ssh server key-string Use the key-string SSH Public Key Configuration mode to be configured from SSH. ip ssh server Use...
Command Line Interface Guide
Page 1274
...config)#crypto key pubkey-chain ssh console(config-pubkey-chain)#user-key bob rsa console(config-pubkey-key)# 1274 SSH Commands RSA key • dsa - user-key Use the user-key command in SSH Public Key Chain Configuration mode to be manually configured for the SSH public key chain called "bob...." Specifies the remote SSH client username. (Range: 1-48 characters) • rsa - Syntax user-key username {rsa|dsa} no form...
...config)#crypto key pubkey-chain ssh console(config-pubkey-chain)#user-key bob rsa console(config-pubkey-key)# 1274 SSH Commands RSA key • dsa - user-key Use the user-key command in SSH Public Key Chain Configuration mode to be manually configured for the SSH public key chain called "bob...." Specifies the remote SSH client username. (Range: 1-48 characters) • rsa - Syntax user-key username {rsa|dsa} no form...
Command Line Interface Guide
Page 1297
Command Mode Global Configuration mode User Guidelines This command has no hostname • name - The name of the command. Example The following example specifies the switch host name. console(config)# hostname Dell initiate failover To manually force a failover from the next reload of ...Switch/Stack. hostname Use the hostname command in Global Configuration mode to the backup unit in Stack Configuration mode. Syntax hostname name no user guidelines. To restore the...
Command Mode Global Configuration mode User Guidelines This command has no hostname • name - The name of the command. Example The following example specifies the switch host name. console(config)# hostname Dell initiate failover To manually force a failover from the next reload of ...Switch/Stack. hostname Use the hostname command in Global Configuration mode to the backup unit in Stack Configuration mode. Syntax hostname name no user guidelines. To restore the...
User's Guide
Page 37
...of MLD v2 is backward compatible with specific MAC addresses. Also supported are manually defined or learned on that port. Locked Port Support The locked port feature limits access on a port to users with MLD v1. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP... routers) to report their IP multicast addresses memberships to any unwarranted attempts to send voice traffic through the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication Protocol (EAP). For information about password management, see "Dot1x Authentication." The protocol ...
...of MLD v2 is backward compatible with specific MAC addresses. Also supported are manually defined or learned on that port. Locked Port Support The locked port feature limits access on a port to users with MLD v1. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP... routers) to report their IP multicast addresses memberships to any unwarranted attempts to send voice traffic through the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication Protocol (EAP). For information about password management, see "Dot1x Authentication." The protocol ...
User's Guide
Page 38
... Guide-provides information about configuring those functions using the command line interface (CLI). 38 Introduction TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. RADIUS Client RADIUS is a client/server-based...manage the switch and stack. TACACS+ TACACS+ provides centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about the switch models in a...
... Guide-provides information about configuring those functions using the command line interface (CLI). 38 Introduction TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. RADIUS Client RADIUS is a client/server-based...manage the switch and stack. TACACS+ TACACS+ provides centralized security for the PowerConnect PowerConnect 6200 Series switches are available on the Dell Support website at www.support.dell.com/manuals: • Getting Started Guide-provides information about the switch models in a...
User's Guide
Page 81
...Dell PowerConnect 81 To save the configuration, enter: console#copy running-config startup-config Easy Setup Wizard An Easy Setup Wizard displays when the system boots up the following information from the network administrator: • Is the network setup for autoconfig, manual... Configuration Overview Before configuring the switch, obtain the following configuration on the switch: • Establishes the initial privileged user account with basic security considerations. • Advanced configuration includes dynamic IP configuration and more advanced configuration. After the ...
...Dell PowerConnect 81 To save the configuration, enter: console#copy running-config startup-config Easy Setup Wizard An Easy Setup Wizard displays when the system boots up the following information from the network administrator: • Is the network setup for autoconfig, manual... Configuration Overview Before configuring the switch, obtain the following configuration on the switch: • Establishes the initial privileged user account with basic security considerations. • Advanced configuration includes dynamic IP configuration and more advanced configuration. After the ...
User's Guide
Page 84
...wizard, and enter CLI mode to run the setup wizard (you must respond to the next question to manually configure the switch. NOTE: In the example below, the possible user options are examples only. Also, where possible, the default value is in parentheses. Help text is ... possible. You may also choose to allow all IP addresses to run the setup wizard within 60 seconds)? [Y/N] y Step 1: 84 Configuring Dell PowerConnect Unit 1 - Please request the actual values from your network adminstrator(s): • IP address for the general flow. Example of prompts and ...
...wizard, and enter CLI mode to run the setup wizard (you must respond to the next question to manually configure the switch. NOTE: In the example below, the possible user options are examples only. Also, where possible, the default value is in parentheses. Help text is ... possible. You may also choose to allow all IP addresses to run the setup wizard within 60 seconds)? [Y/N] y Step 1: 84 Configuring Dell PowerConnect Unit 1 - Please request the actual values from your network adminstrator(s): • IP address for the general flow. Example of prompts and ...
User's Guide
Page 213
...detailed information about each client connected to the switch through the captive portal, click System →Captive Portal →Client Detail. Figure 6-81. Displays the user name (or Guest ID) of the client (if applicable). • IP Address - Configuring System Information 213 The list of the client (if applicable). •... portal to disconnect an authenticated client, select the Remove check box next to disconnect one or more authenticated clients. From this page, you can manually force the captive portal to the client MAC address and click Apply Changes.
...detailed information about each client connected to the switch through the captive portal, click System →Captive Portal →Client Detail. Figure 6-81. Displays the user name (or Guest ID) of the client (if applicable). • IP Address - Configuring System Information 213 The list of the client (if applicable). •... portal to disconnect an authenticated client, select the Remove check box next to disconnect one or more authenticated clients. From this page, you can manually force the captive portal to the client MAC address and click Apply Changes.
User's Guide
Page 218
...how to manually configure the local engineID for the stack. This local engineID must be enabled without authentication. • Timeliness - The SNMP agent defines the MIB specification format, as well as the format used for SNMPv3 and includes: • Authentication - In addition, the User Security ... the variables controlled by the system to the SNMP agent are used to do this because the default engineID in the SNMPv3 User Security Model (USM). Access rights to manage device features. However privacy cannot be defined for managing network devices. The device supports...
...how to manually configure the local engineID for the stack. This local engineID must be enabled without authentication. • Timeliness - The SNMP agent defines the MIB specification format, as well as the format used for SNMPv3 and includes: • Authentication - In addition, the User Security ... the variables controlled by the system to the SNMP agent are used to do this because the default engineID in the SNMPv3 User Security Model (USM). Access rights to manage device features. However privacy cannot be defined for managing network devices. The device supports...
User's Guide
Page 294
... maximum number of seconds the switch waits for a response from the client before retransmitting the request. Sets the maximum number of ports that have authenticated users. Manually initiates a re-authentication of MAC Authentication Bypass. Enables 802.1X globally. Sets the number of seconds the switch waits for a response to display lists of...
... maximum number of seconds the switch waits for a response from the client before retransmitting the request. Sets the maximum number of ports that have authenticated users. Manually initiates a re-authentication of MAC Authentication Bypass. Enables 802.1X globally. Sets the number of seconds the switch waits for a response to display lists of...
Configuration Guide
Page 50
After the limit is not seen within the age-out time. Static Locking: User manually specifies a list of MAC addresses that can set for a port. Overview Port Security: • Allows for aging. 50 Switching Configuration These methods can be ...learned on a port. Operation Port Security: • Helps secure network by another packet with an allowable source MAC address are not learned. Dynamic Locking: User specifies the maximum number of static MAC addresses for a port, set the dynamic entries to be forwarded. • Supports both dynamic and static. • ...
After the limit is not seen within the age-out time. Static Locking: User manually specifies a list of MAC addresses that can set for a port. Overview Port Security: • Allows for aging. 50 Switching Configuration These methods can be ...learned on a port. Operation Port Security: • Helps secure network by another packet with an allowable source MAC address are not learned. Dynamic Locking: User specifies the maximum number of static MAC addresses for a port, set the dynamic entries to be forwarded. • Supports both dynamic and static. • ...