User's Guide
Page 36
... Documentation Another resource for the PowerConnect 8024/8024F is similar to an inbound telnet connection. When a frame is seen on a locked port, and the frame source MAC address is not tied to that is the CLI Reference Guide, which the server maintains a user database that contains user authentication information, such as user name, password, and accounting...
... Documentation Another resource for the PowerConnect 8024/8024F is similar to an inbound telnet connection. When a frame is seen on a locked port, and the frame source MAC address is not tied to that is the CLI Reference Guide, which the server maintains a user database that contains user authentication information, such as user name, password, and accounting...
User's Guide
Page 67
...autoconfig feature? The initial account is designed to guide you may return later to set up more advanced security considerations. You may enter the system to configure Radius or TACACS+. • Sets up without a configuration or with a valid password. Configuring Dell™ PowerConnect™ 67 The system is not necessary (... default management VLAN ID=1. Configuration Overview Before configuring the switch, obtain the following configuration on the switch: • Establishes the initial privileged user account with only the default factory configuration.
...autoconfig feature? The initial account is designed to guide you may return later to set up more advanced security considerations. You may enter the system to configure Radius or TACACS+. • Sets up without a configuration or with a valid password. Configuring Dell™ PowerConnect™ 67 The system is not necessary (... default management VLAN ID=1. Configuration Overview Before configuring the switch, obtain the following configuration on the switch: • Establishes the initial privileged user account with only the default factory configuration.
User's Guide
Page 70
...the initial values as defined. • A network management system is configured. After you can : 70 Configuring Dell™ PowerConnect™ NOTE: In the example below, the possible user options are examples only. Also, where possible, the default value is accepted. Note: You can skip the ...to be used by entering [ctrl+z]. SNMPv3 is disabled. • The admin user account is configured. You may also choose to allow all IP addresses to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you can access the SNMP, ...
...the initial values as defined. • A network management system is configured. After you can : 70 Configuring Dell™ PowerConnect™ NOTE: In the example below, the possible user options are examples only. Also, where possible, the default value is accepted. Note: You can skip the ...to be used by entering [ctrl+z]. SNMPv3 is disabled. • The admin user account is configured. You may also choose to allow all IP addresses to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you can access the SNMP, ...
User's Guide
Page 74
...user is the 10 Gb Ethernet port 2). Interface Naming Convention In an industry-standard CLI implementation, there is used to get context sensitive help in a stacking solution where a number of parameters that only the missing parameters are required to form a virtual device. NOTE: The PowerConnect 8024... by the interface number. It can also be registered with some partially entered commands. PowerConnect 8024 and 8024F CLI Reference Guide For detailed information on Dell devices are defined in the command tree. Context Sensitive Help Use the ? The convention...
...user is the 10 Gb Ethernet port 2). Interface Naming Convention In an industry-standard CLI implementation, there is used to get context sensitive help in a stacking solution where a number of parameters that only the missing parameters are required to form a virtual device. NOTE: The PowerConnect 8024... by the interface number. It can also be registered with some partially entered commands. PowerConnect 8024 and 8024F CLI Reference Guide For detailed information on Dell devices are defined in the command tree. Context Sensitive Help Use the ? The convention...
User's Guide
Page 103
... (0 - 255 characters) - Displays the current system date. Displays the switch's position in the GUI banner. • Sys Object ID - Displays the user-defined device reference. • Serial No. - The assigned System Object ID. • MAC Address - Define the following fields: • System Name ... - 255 characters) - If the client has a Microsoft® Windows® environment, the program must exist in the CLI Reference Guide: Configuring System Information 103 The Asset page contains the following fields: System Name, System Contact, System Location, and Asset Tag. 3. ...
... (0 - 255 characters) - Displays the current system date. Displays the switch's position in the GUI banner. • Sys Object ID - Displays the user-defined device reference. • Serial No. - The assigned System Object ID. • MAC Address - Define the following fields: • System Name ... - 255 characters) - If the client has a Microsoft® Windows® environment, the program must exist in the CLI Reference Guide: Configuring System Information 103 The Asset page contains the following fields: System Name, System Contact, System Location, and Asset Tag. 3. ...
User's Guide
Page 119
... Description Use to define SNTP authentication settings. To display the SNTP Server page, click System →SNTP →SNTP Server in the CLI Reference Guide. Selects user-defined SNTP server IP address from a drop-down menu. Defining SNTP Authentication Settings Using CLI Commands For information about the CLI commands that perform this...
... Description Use to define SNTP authentication settings. To display the SNTP Server page, click System →SNTP →SNTP Server in the CLI Reference Guide. Selects user-defined SNTP server IP address from a drop-down menu. Defining SNTP Authentication Settings Using CLI Commands For information about the CLI commands that perform this...
User's Guide
Page 134
... is assigned to all unqualified host names. Provides an IP address that perform this function, see the IP Addressing Commands chapter in the CLI Reference Guide. Removes the host name IP mapping when checked. 134 Configuring System Information Host Name Mapping Use the Host Name Mapping page to assign an IP.... Figure 6-26. DNS Domain Names Commands CLI Command ip domain-name Description Use to define a default domain name to complete unqualified host names. Contains the user-defined default domain name.
... is assigned to all unqualified host names. Provides an IP address that perform this function, see the IP Addressing Commands chapter in the CLI Reference Guide. Removes the host name IP mapping when checked. 134 Configuring System Information Host Name Mapping Use the Host Name Mapping page to assign an IP.... Figure 6-26. DNS Domain Names Commands CLI Command ip domain-name Description Use to define a default domain name to complete unqualified host names. Contains the user-defined default domain name.
User's Guide
Page 149
...System Information 149 Displays management access-lists. Use the Authentication Profiles page to define access profiles. Click Apply Changes. Authentication Profiles User authentication occurs locally and on the device. Select a rule. 4. The rule is removed, and the device is used....Profiles page, click System →Management Security →Authentication Profiles in the CLI Reference Guide. The following table summarizes the equivalent CLI commands you use to select the user authentication method on an external server. Defines a permit rule. Defines a management access-...
...System Information 149 Displays management access-lists. Use the Authentication Profiles page to define access profiles. Click Apply Changes. Authentication Profiles User authentication occurs locally and on the device. Select a rule. 4. The rule is removed, and the device is used....Profiles page, click System →Management Security →Authentication Profiles in the CLI Reference Guide. The following table summarizes the equivalent CLI commands you use to select the user authentication method on an external server. Defines a permit rule. Defines a management access-...
User's Guide
Page 152
3. The user authentication profile is removed. Authentication Profiles Table 3. Click Show All. Check the Remove check box next to the profile to the device. The entry is ... an Authentication Profile Using CLI Commands For information about the CLI commands that perform this function, see the AAA Commands chapter in the CLI Reference Guide: The following table summarizes the equivalent CLI commands you use. 152 Configuring System Information Select one or more Optional Methods by using the arrows. 4. Click...
3. The user authentication profile is removed. Authentication Profiles Table 3. Click Show All. Check the Remove check box next to the profile to the device. The entry is ... an Authentication Profile Using CLI Commands For information about the CLI commands that perform this function, see the AAA Commands chapter in the CLI Reference Guide: The following table summarizes the equivalent CLI commands you use. 152 Configuring System Information Select one or more Optional Methods by using the arrows. 4. Click...
User's Guide
Page 157
... length is changed, before a password is used a defined number of times. See the "Clock Commands" section in the CLI Reference Guide for additional information. • Consecutive Passwords Before Reuse (1-10) - Configuring System Information 157 Password Management The Password Management page contains the...The password constraints are 1 to an SNTP server. Indicates the minimum password length, when checked. When selected, enables locking a user out of time that elapses before the password can be reused. Indicates the amount of the device when a faulty password is aged...
... length is changed, before a password is used a defined number of times. See the "Clock Commands" section in the CLI Reference Guide for additional information. • Consecutive Passwords Before Reuse (1-10) - Configuring System Information 157 Password Management The Password Management page contains the...The password constraints are 1 to an SNTP server. Indicates the minimum password length, when checked. When selected, enables locking a user out of time that elapses before the password can be reused. Indicates the amount of the device when a faulty password is aged...
User's Guide
Page 158
...equivalent CLI commands you use. Displays the configuration parameters for users and reactivate users whose accounts have been suspended. Local User Database Use the Local User Database page to define passwords, access rights for password ...configuration. Defining Password Constraints Using CLI Commands For information about the CLI commands that count. To display the Local User Database page, click System →Management Security →Local User Database in the CLI Reference Guide...
...equivalent CLI commands you use. Displays the configuration parameters for users and reactivate users whose accounts have been suspended. Local User Database Use the Local User Database page to define passwords, access rights for password ...configuration. Defining Password Constraints Using CLI Commands For information about the CLI commands that count. To display the Local User Database page, click System →Management Security →Local User Database in the CLI Reference Guide...
User's Guide
Page 161
...) - The password appears in the CLI Reference Guide. Table 6-27. The line password for management methods. Configuring System Information 161 Figure 6-49. Assigning Users With CLI Commands For information about the local user database. To display the Line Password page, click... characters) - Drop-down menu specifies device access through a console, Telnet, or Secure Telnet session. Users Commands CLI Command password username show user accounts Description Specifies a user password Establishes a username-based authentication system. Confirms the new line password.
...) - The password appears in the CLI Reference Guide. Table 6-27. The line password for management methods. Configuring System Information 161 Figure 6-49. Assigning Users With CLI Commands For information about the local user database. To display the Line Password page, click... characters) - Drop-down menu specifies device access through a console, Telnet, or Secure Telnet session. Users Commands CLI Command password username show user accounts Description Specifies a user password Establishes a username-based authentication system. Confirms the new line password.
User's Guide
Page 163
...local password to control access to normal and privilege levels. Performed at login. The TACACS+ protocol ensures network security through user names and user-defined passwords. • Authorization - To display the TACACS+ Settings page, click System →Management Security →TACACS... security for the inband management port. The password appears in the CLI Reference Guide. The Enable password is completed, an authorization session starts using the authenticated user name. Table 6-29. Provides authentication during login and through encrypted protocol exchanges ...
...local password to control access to normal and privilege levels. Performed at login. The TACACS+ protocol ensures network security through user names and user-defined passwords. • Authorization - To display the TACACS+ Settings page, click System →Management Security →TACACS... security for the inband management port. The password appears in the CLI Reference Guide. The Enable password is completed, an authorization session starts using the authenticated user name. Table 6-29. Provides authentication during login and through encrypted protocol exchanges ...
User's Guide
Page 184
... configure Captive Portal settings, refer to the Captive Portal Commands chapter in the CLI Reference Guide. These packets are dropped except for both guest and authenticated users. You can get an IP address and be able to resolve the hostname or domain names... view and configure system Captive Portal settings: • CP Global Configuration • CP Configuration • CP Web Customization • Local User • User Group • Interface Association • CP Status • CP Activation and Activity Status • Interface Activation Status • Interface Capability...
... configure Captive Portal settings, refer to the Captive Portal Commands chapter in the CLI Reference Guide. These packets are dropped except for both guest and authenticated users. You can get an IP address and be able to resolve the hostname or domain names... view and configure system Captive Portal settings: • CP Global Configuration • CP Configuration • CP Web Customization • Local User • User Group • Interface Association • CP Status • CP Activation and Activity Status • Interface Activation Status • Interface Capability...
User's Guide
Page 213
...to define the user authentication method. To display the SNMPv3 User Security Model (USM) page, click System →SNMP →User Security Model in the CLI Reference Guide. Select a group. 4. SNMPv3 User Security Model (USM) Use the SNMPv3 User Security Model (USM) page to assign system users to SNMP groups.... 2. Check Remove. 5. Defining SNMP Access Control Using CLI Commands For information about the CLI commands that maps SNMP users to the group name. The group is removed, and the device is updated. Displays the configuration of groups. The Access Table opens. 3.
...to define the user authentication method. To display the SNMPv3 User Security Model (USM) page, click System →SNMP →User Security Model in the CLI Reference Guide. Select a group. 4. SNMPv3 User Security Model (USM) Use the SNMPv3 User Security Model (USM) page to assign system users to SNMP groups.... 2. Check Remove. 5. Defining SNMP Access Control Using CLI Commands For information about the CLI commands that maps SNMP users to the group name. The group is removed, and the device is updated. Displays the configuration of groups. The Access Table opens. 3.
User's Guide
Page 217
Check the Remove check box. 5. Figure 6-97. Configures a new SNMP Version 3 user. Defining SNMP Users Using CLI Commands For information about the CLI commands that perform this function, see the SNMP Commands chapter in the tree ... display the SNMPv1, 2 Community page, click System →SNMP →Communities in the CLI Reference Guide. SNMP Users Commands CLI Command show snmp users snmp-server user Description Displays the configuration of users. When the community names are changed, access rights are managed by defining communities on the SNMPv1, 2 Community page. ...
Check the Remove check box. 5. Figure 6-97. Configures a new SNMP Version 3 user. Defining SNMP Users Using CLI Commands For information about the CLI commands that perform this function, see the SNMP Commands chapter in the tree ... display the SNMPv1, 2 Community page, click System →SNMP →Communities in the CLI Reference Guide. SNMP Users Commands CLI Command show snmp users snmp-server user Description Displays the configuration of users. When the community names are changed, access rights are managed by defining communities on the SNMPv1, 2 Community page. ...
User's Guide
Page 220
...Figure 6-100. Sets up the community access string to permit access to filter notifications. This field can contain a maximum of user-defined notification filters. Notification Filter The Notification Filter page contains the following table summarizes the equivalent CLI commands you to SNMP ... filter. To display the Notification Filter page, click System →SNMP →Notification Filters in the CLI Reference Guide. Configuring Communities Using CLI Commands For information about the CLI commands that perform this function, see the SNMP Commands chapter in...
...Figure 6-100. Sets up the community access string to permit access to filter notifications. This field can contain a maximum of user-defined notification filters. Notification Filter The Notification Filter page contains the following table summarizes the equivalent CLI commands you to SNMP ... filter. To display the Notification Filter page, click System →SNMP →Notification Filters in the CLI Reference Guide. Configuring Communities Using CLI Commands For information about the CLI commands that perform this function, see the SNMP Commands chapter in...
User's Guide
Page 222
...Access Control Checks To display the Notification Recipients page, click System →SNMP →Notification Recipient in the CLI Reference Guide. Notification Filters Configuration Commands CLI Command show snmp filters snmp-server filter Description Displays the configuration of filters. Select the Filter...Notification page displays. 3. SNMP notification filters provide the following table summarizes the equivalent CLI commands you use to specific users, and the trap type sent. Configuring Notification Filters Using CLI Commands For information about the CLI commands that determine ...
...Access Control Checks To display the Notification Recipients page, click System →SNMP →Notification Recipient in the CLI Reference Guide. Notification Filters Configuration Commands CLI Command show snmp filters snmp-server filter Description Displays the configuration of filters. Select the Filter...Notification page displays. 3. SNMP notification filters provide the following table summarizes the equivalent CLI commands you use to specific users, and the trap type sent. Configuring Notification Filters Using CLI Commands For information about the CLI commands that determine ...
User's Guide
Page 230
... fields. 4. NOTE: After you use to which the configuration files are : - The software is complete. 6. Specify the path of the user on the server. Used for the file you are downloading a configuration file, select the Destination File Name. 5. Startup Configuration - Downloads the backup... configuration files. • Select File - Used in the CLI Reference Guide. You may enter up to initiate the file download. Open the File Download From Server page. 2. Downloading Files Using CLI Commands For ...
... fields. 4. NOTE: After you use to which the configuration files are : - The software is complete. 6. Specify the path of the user on the server. Used for the file you are downloading a configuration file, select the Destination File Name. 5. Startup Configuration - Downloads the backup... configuration files. • Select File - Used in the CLI Reference Guide. You may enter up to initiate the file download. Open the File Download From Server page. 2. Downloading Files Using CLI Commands For ...
User's Guide
Page 232
... page. 2. Valid field values are: - Backup Configuration - Define the applicable fields in the CLI Reference Guide. Table 6-51. You can be 1 - 32 characters. • User Name - The name can also backup images to local or remote systems or restore images from local or ...refreshes and a transfer status field appears to which the file will have after it is uploaded. • Destination File Name - Password of the user on the server. Running Configuration - The software is complete. 4. SCP - Uploads the running configuration file. - Uploads the startup configuration files....
... page. 2. Valid field values are: - Backup Configuration - Define the applicable fields in the CLI Reference Guide. Table 6-51. You can be 1 - 32 characters. • User Name - The name can also backup images to local or remote systems or restore images from local or ...refreshes and a transfer status field appears to which the file will have after it is uploaded. • Destination File Name - Password of the user on the server. Running Configuration - The software is complete. 4. SCP - Uploads the running configuration file. - Uploads the startup configuration files....