User's Guide
Page 36
...) protocol provides a means of users accessing the switch. Once established, such a connection is located on the Dell Support website at www.support.dell.com/manuals. Password Management Security... Password management provides increased network security and improved password control. Locked Port Support The locked port feature limits access on a port to users with RADIUS and other authentication processes. Passwords for the PowerConnect 8024/8024F is the CLI Reference Guide, which the server maintains a user...
...) protocol provides a means of users accessing the switch. Once established, such a connection is located on the Dell Support website at www.support.dell.com/manuals. Password Management Security... Password management provides increased network security and improved password control. Locked Port Support The locked port feature limits access on a port to users with RADIUS and other authentication processes. Passwords for the PowerConnect 8024/8024F is the CLI Reference Guide, which the server maintains a user...
User's Guide
Page 67
... network setup for the management VLAN. The wizard sets up without a configuration or with a valid password. Configuring Dell™ PowerConnect™ 67 The system is designed to guide you through some initial steps to make the switch manageable. The initial turn-up the IP address for the autoconfig... system to use the local authentication setting only. The wizard configures one privileged user account during the set up basic system configuration and security and to set up . The Easy Setup Wizard guides you may return later to configure Radius or TACACS+. • Sets up ...
... network setup for the management VLAN. The wizard sets up without a configuration or with a valid password. Configuring Dell™ PowerConnect™ 67 The system is designed to guide you through some initial steps to make the switch manageable. The initial turn-up the IP address for the autoconfig... system to use the local authentication setting only. The wizard configures one privileged user account during the set up basic system configuration and security and to set up . The Easy Setup Wizard guides you may return later to configure Radius or TACACS+. • Sets up ...
User's Guide
Page 70
... The Setup Wizard guides you through the initial switch configuration, and gets you like to be used by default. Would you up and running an example Dell Easy Setup Wizard session...This section describes an Easy Setup Wizard session. You can : 70 Configuring Dell™ PowerConnect™ After you enter with normal operation using SNMP (required for the management VLAN ... with no options defined, the default value is configured. NOTE: In the example below, the possible user options are examples only. Also, where possible, the default value is configured. See the state diagram ...
... The Setup Wizard guides you through the initial switch configuration, and gets you like to be used by default. Would you up and running an example Dell Easy Setup Wizard session...This section describes an Easy Setup Wizard session. You can : 70 Configuring Dell™ PowerConnect™ After you enter with normal operation using SNMP (required for the management VLAN ... with no options defined, the default value is configured. NOTE: In the example below, the possible user options are examples only. Also, where possible, the default value is configured. See the state diagram ...
User's Guide
Page 74
The ? Parameters that are already provided by the user is left out of the command list so that are required to return the list of parameters that only the missing parameters are listed. The ... addresses through DHCP and BOOTP, the configuration received from these servers includes the IP address, and may include subnet mask and default gateway. 74 Configuring Dell™ PowerConnect™ PowerConnect 8024 and 8024F CLI Reference Guide For detailed information on the first unit. • Interface Types - command to list possible commands starting with...
The ? Parameters that are already provided by the user is left out of the command list so that are required to return the list of parameters that only the missing parameters are listed. The ... addresses through DHCP and BOOTP, the configuration received from these servers includes the IP address, and may include subnet mask and default gateway. 74 Configuring Dell™ PowerConnect™ PowerConnect 8024 and 8024F CLI Reference Guide For detailed information on the first unit. • Interface Types - command to list possible commands starting with...
User's Guide
Page 103
...switch. • Sys Uptime - Displays the current system time. For example, 20:12:03 is month, day, year (MM/DD/YY). Displays the user-defined device reference. • Serial No. - Open the Asset page. 2. Initiating a Telnet Session 1. The prompt appears, indicating that appears on the... GUI banner (if enabled). • Banner motd acknowledge - The Asset page contains the following chapters in the CLI Reference Guide: Configuring System Information 103 Enter the message that the system is updated. Open the Asset page. If the client has a Microsoft®...
...switch. • Sys Uptime - Displays the current system time. For example, 20:12:03 is month, day, year (MM/DD/YY). Displays the user-defined device reference. • Serial No. - Open the Asset page. 2. Initiating a Telnet Session 1. The prompt appears, indicating that appears on the... GUI banner (if enabled). • Banner motd acknowledge - The Asset page contains the following chapters in the CLI Reference Guide: Configuring System Information 103 Enter the message that the system is updated. Open the Asset page. If the client has a Microsoft®...
User's Guide
Page 119
... key for received Network Time protocol (NTP) traffic. Configuring System Information 119 Use to define SNTP authentication settings. Up to add new SNTP servers. Selects user-defined SNTP server IP address from a drop-down menu. Table 6-9. Defining SNTP Authentication Settings Using CLI Commands For information about the CLI commands that perform... of a system to require server authentication for SNTP. To display the SNTP Server page, click System →SNTP →SNTP Server in the CLI Reference Guide. The following fields: • SNTP Server -
... key for received Network Time protocol (NTP) traffic. Configuring System Information 119 Use to define SNTP authentication settings. Up to add new SNTP servers. Selects user-defined SNTP server IP address from a drop-down menu. Table 6-9. Defining SNTP Authentication Settings Using CLI Commands For information about the CLI commands that perform... of a system to require server authentication for SNTP. To display the SNTP Server page, click System →SNTP →SNTP Server in the CLI Reference Guide. The following fields: • SNTP Server -
User's Guide
Page 134
... Static Host Name Mapping page. Provides an IP address that perform this function, see the IP Addressing Commands chapter in the CLI Reference Guide. The Default Domain Name page contains the following fields: • Host Name - When configured, the default domain name is assigned to...Information The following table summarizes the equivalent CLI commands you use to a static host name. Contains a list of host names. Contains the user-defined default domain name. To display the Host Name Mapping page, click System →IP Addressing →Host Name Mapping. Defining DNS Domain...
... Static Host Name Mapping page. Provides an IP address that perform this function, see the IP Addressing Commands chapter in the CLI Reference Guide. The Default Domain Name page contains the following fields: • Host Name - When configured, the default domain name is assigned to...Information The following table summarizes the equivalent CLI commands you use to a static host name. Contains a list of host names. Contains the user-defined default domain name. To display the Host Name Mapping page, click System →IP Addressing →Host Name Mapping. Defining DNS Domain...
User's Guide
Page 149
... Defines a permit rule. To display the Authentication Profiles page, click System →Management Security →Authentication Profiles in the CLI Reference Guide. Open the Access Profile page. 2. Click Show All to define access profiles. Check the Remove check box. 5. The rule is ...removed, and the device is used. Authentication Profiles User authentication occurs locally and on the device. Select a rule. 4. Click Apply Changes. Displays the active management access-list. Access Profiles Commands...
... Defines a permit rule. To display the Authentication Profiles page, click System →Management Security →Authentication Profiles in the CLI Reference Guide. Open the Access Profile page. 2. Click Show All to define access profiles. Check the Remove check box. 5. The rule is ...removed, and the device is used. Authentication Profiles User authentication occurs locally and on the device. Select a rule. 4. Click Apply Changes. Displays the active management access-list. Access Profiles Commands...
User's Guide
Page 152
...Profile Using CLI Commands For information about the CLI commands that perform this function, see the AAA Commands chapter in the CLI Reference Guide: The following table summarizes the equivalent CLI commands you use. 152 Configuring System Information Select one or more Optional Methods by using ...the arrows. 4. The user authentication profile is removed. Click Show All. Check the Remove check box next to the profile to the device. Figure 6-43. 3....
...Profile Using CLI Commands For information about the CLI commands that perform this function, see the AAA Commands chapter in the CLI Reference Guide: The following table summarizes the equivalent CLI commands you use. 152 Configuring System Information Select one or more Optional Methods by using ...the arrows. 4. The user authentication profile is removed. Click Show All. Check the Remove check box next to the profile to the device. Figure 6-43. 3....
User's Guide
Page 157
... on the sixth attempt. When selected, enables locking a user out of the device when a faulty password is updated. Define the relevant fields. 3. See the "Clock Commands" section in the CLI Reference Guide for additional information. • Consecutive Passwords Before Reuse (1-10) - The possible field values are defined, and the device is used...
... on the sixth attempt. When selected, enables locking a user out of the device when a faulty password is updated. Define the relevant fields. 3. See the "Clock Commands" section in the CLI Reference Guide for additional information. • Consecutive Passwords Before Reuse (1-10) - The possible field values are defined, and the device is used...
User's Guide
Page 158
... not reuse their passwords too frequently. To display the Local User Database page, click System →Management Security →Local User Database in must enter the correct password within that perform this function, see the Password Management Commands chapter in the CLI Reference Guide. Displays the configuration parameters for password configuration. Defining Password...
... not reuse their passwords too frequently. To display the Local User Database page, click System →Management Security →Local User Database in must enter the correct password within that perform this function, see the Password Management Commands chapter in the CLI Reference Guide. Displays the configuration parameters for password configuration. Defining Password...
User's Guide
Page 161
... CLI Commands For information about the local user database. The line password for management methods. The password appears in the CLI Reference Guide. Line Passwords Use the Line Password page to define line passwords for accessing the device through a Console, ... this function, see the AAA Commands chapter in the ***** format. Confirms the new line password. Users Commands CLI Command password username show user accounts Description Specifies a user password Establishes a username-based authentication system. The password appears in the tree view. Drop-down menu...
... CLI Commands For information about the local user database. The line password for management methods. The password appears in the CLI Reference Guide. Line Passwords Use the Line Password page to define line passwords for accessing the device through a Console, ... this function, see the AAA Commands chapter in the ***** format. Confirms the new line password. Users Commands CLI Command password username show user accounts Description Specifies a user password Establishes a username-based authentication system. The password appears in the tree view. Drop-down menu...
User's Guide
Page 163
... click System →Management Security →TACACS+ in the ***** format. Click Apply Changes. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. Defining Enable Passwords Using CLI Commands For information ...***** format. • Confirm Enable Password - The TACACS+ server checks the user privileges. Configuring System Information 163 Specify the Enable password. 3. The password appears in the CLI Reference Guide. • Enable Password (8-64 characters) - Defining Enable Passwords 1. The ...
... click System →Management Security →TACACS+ in the ***** format. Click Apply Changes. TACACS+ provides a centralized user management system, while still retaining consistency with RADIUS and other authentication processes. Defining Enable Passwords Using CLI Commands For information ...***** format. • Confirm Enable Password - The TACACS+ server checks the user privileges. Configuring System Information 163 Specify the Enable password. 3. The password appears in the CLI Reference Guide. • Enable Password (8-64 characters) - Defining Enable Passwords 1. The ...
User's Guide
Page 184
...view and configure system Captive Portal settings: • CP Global Configuration • CP Configuration • CP Web Customization • Local User • User Group • Interface Association • CP Status • CP Activation and Activity Status • Interface Activation Status • Interface ...server on a RADIUS server. The Captive Portal folder contains links to the Captive Portal Commands chapter in the CLI Reference Guide. If an unauthenticated client opens a web browser and tries to connect to network, the Captive Portal redirects all captive portals...
...view and configure system Captive Portal settings: • CP Global Configuration • CP Configuration • CP Web Customization • Local User • User Group • Interface Association • CP Status • CP Activation and Activity Status • Interface Activation Status • Interface ...server on a RADIUS server. The Captive Portal folder contains links to the Captive Portal Commands chapter in the CLI Reference Guide. If an unauthenticated client opens a web browser and tries to connect to network, the Captive Portal redirects all captive portals...
User's Guide
Page 213
... SNMP Commands chapter in the tree view. To display the SNMPv3 User Security Model (USM) page, click System →SNMP →User Security Model in the CLI Reference Guide. The following table summarizes the equivalent CLI commands you use to define the user authentication method. Click Show All. Click Apply Changes. Displays the configuration...
... SNMP Commands chapter in the tree view. To display the SNMPv3 User Security Model (USM) page, click System →SNMP →User Security Model in the CLI Reference Guide. The following table summarizes the equivalent CLI commands you use to define the user authentication method. Click Show All. Click Apply Changes. Displays the configuration...
User's Guide
Page 217
..., click System →SNMP →Communities in the CLI Reference Guide. SNMP Users Commands CLI Command show snmp users snmp-server user Description Displays the configuration of users. 4. The entry is removed, and the device is updated. Check the Remove check box. 5. Defining SNMP Users Using CLI Commands For information about the CLI commands that perform...
..., click System →SNMP →Communities in the CLI Reference Guide. SNMP Users Commands CLI Command show snmp users snmp-server user Description Displays the configuration of users. 4. The entry is removed, and the device is updated. Check the Remove check box. 5. Defining SNMP Users Using CLI Commands For information about the CLI commands that perform...
User's Guide
Page 220
... SNMP communities. To display the Notification Filter page, click System →SNMP →Notification Filters in the CLI Reference Guide. Configuring Communities Using CLI Commands For information about the CLI commands that perform this function, see the SNMP Commands chapter in.... • New Object Identifier Tree - Displays the OID configured for the selected filter. This field can contain a maximum of user-defined notification filters. Table 6-45. Notification Filter The Notification Filter page contains the following table summarizes the equivalent CLI commands you to...
... SNMP communities. To display the Notification Filter page, click System →SNMP →Notification Filters in the CLI Reference Guide. Configuring Communities Using CLI Commands For information about the CLI commands that perform this function, see the SNMP Commands chapter in.... • New Object Identifier Tree - Displays the OID configured for the selected filter. This field can contain a maximum of user-defined notification filters. Table 6-45. Notification Filter The Notification Filter page contains the following table summarizes the equivalent CLI commands you to...
User's Guide
Page 222
...• Providing Access Control Checks To display the Notification Recipients page, click System →SNMP →Notification Recipient in the CLI Reference Guide. Creates or updates an SNMP server filter entry. SNMP notification filters provide the following table summarizes the equivalent CLI commands you use to ...the SNMP Commands chapter in the tree view. 222 Configuring System Information Notification Recipients Use the Notification Recipients page to specific users, and the trap type sent. The Show Notification page displays. 3. Open the Notification Filter page. 2.
...• Providing Access Control Checks To display the Notification Recipients page, click System →SNMP →Notification Recipient in the CLI Reference Guide. Creates or updates an SNMP server filter entry. SNMP notification filters provide the following table summarizes the equivalent CLI commands you use to ...the SNMP Commands chapter in the tree view. 222 Configuring System Information Notification Recipients Use the Notification Recipients page to specific users, and the trap type sent. The Show Notification page displays. 3. Open the Notification Filter page. 2.
User's Guide
Page 230
- Specify the TFTP/SFTP/SCP server IP address from the TFTP/SFTP/SCP server. • User Name - Used in the CLI Reference Guide. Enter the path and filename or browse for the file you start a file download, the page refreshes and a transfer status field appears...summarizes the equivalent CLI commands you are : - Startup Configuration - Downloads the backup configuration files. • Select File - HTTP - Download files of the user on the server. Used for authentication in other words, by using your web browser). • Server Address - Verify the IP address of SFTP/SCP ...
- Specify the TFTP/SFTP/SCP server IP address from the TFTP/SFTP/SCP server. • User Name - Used in the CLI Reference Guide. Enter the path and filename or browse for the file you start a file download, the page refreshes and a transfer status field appears...summarizes the equivalent CLI commands you are : - Startup Configuration - Downloads the backup configuration files. • Select File - HTTP - Download files of the user on the server. Used for authentication in other words, by using your web browser). • Server Address - Verify the IP address of SFTP/SCP ...
User's Guide
Page 232
...copying files within the file system, but also to indicate the number of the user on the server. SCP - HTTP- Valid field values are: - Define the applicable fields in the CLI Reference Guide. The Web interface is blocked until the file upload is uploaded. • Destination... File Name - Table 6-51. Password of bytes transferred. Used for authentication in case of the user on the server. Running Configuration - Uploads the ...
...copying files within the file system, but also to indicate the number of the user on the server. SCP - HTTP- Valid field values are: - Define the applicable fields in the CLI Reference Guide. The Web interface is blocked until the file upload is uploaded. • Destination... File Name - Table 6-51. Password of bytes transferred. Used for authentication in case of the user on the server. Running Configuration - Uploads the ...