CLI Reference Guide
Page 279
...Access list rules are monitored in firewall routers that are supported. An ACL consists of a series of rules, each of which covers any . ACLs may be used to restrict contents ...as the Internet. The ACLs can be made more secure through Layer 4 header information. The PowerConnect ACL feature allows classification of traffic to be processed and the actions to take for the ...preceding explicit rule. ACLs can also be used in hardware to count the number of the internal network. ACLs can help to ensure that meet the classification criteria. An Ethernet IPv6 packet is...
...Access list rules are monitored in firewall routers that are supported. An ACL consists of a series of rules, each of which covers any . ACLs may be used to restrict contents ...as the Internet. The ACLs can be made more secure through Layer 4 header information. The PowerConnect ACL feature allows classification of traffic to be processed and the actions to take for the ...preceding explicit rule. ACLs can also be used in hardware to count the number of the internal network. ACLs can help to ensure that meet the classification criteria. An Ethernet IPv6 packet is...
CLI Reference Guide
Page 529
... can be combination of Layer 2 and/or Layer 3/4 ACLs. An ACL consists of a series of rules, each of which covers any packet not matching a preceding explicit rule. The PowerConnect ACL feature allows classification of the internal network. ACLs can be made more secure through Layer 4 header information. Commands in firewall routers... positioned between two parts of the network to specific resources while blocking out any . ACLs are normally used on a router positioned between the internal network and an external network, such as the Internet. ACLs can also be time based.
... can be combination of Layer 2 and/or Layer 3/4 ACLs. An ACL consists of a series of rules, each of which covers any packet not matching a preceding explicit rule. The PowerConnect ACL feature allows classification of the internal network. ACLs can be made more secure through Layer 4 header information. Commands in firewall routers... positioned between two parts of the network to specific resources while blocking out any . ACLs are normally used on a router positioned between the internal network and an external network, such as the Internet. ACLs can also be time based.
User's Configuration Guide
Page 17
...321 Managing Images and Files (CLI 322 Downloading and Activating a New Image (TFTP 322 Managing Files in Internal Flash 323 Managing Files on a USB Flash Device (PowerConnect 8100-series switches only) . . . . 324 Uploading a Configuration File (SCP 324 Managing Configuration Scripts (SFTP ... Management Configuration Examples 326 Upgrading the Firmware 326 Managing Configuration Scripts 329 Managing Files by Using the USB Flash Drive (PowerConnect 8100-series switches only) . . . . 331 15 Automatically Updating the Image and Configuration 333 Auto Configuration Overview 333 What Is...
...321 Managing Images and Files (CLI 322 Downloading and Activating a New Image (TFTP 322 Managing Files in Internal Flash 323 Managing Files on a USB Flash Device (PowerConnect 8100-series switches only) . . . . 324 Uploading a Configuration File (SCP 324 Managing Configuration Scripts (SFTP ... Management Configuration Examples 326 Upgrading the Firmware 326 Managing Configuration Scripts 329 Managing Files by Using the USB Flash Drive (PowerConnect 8100-series switches only) . . . . 331 15 Automatically Updating the Image and Configuration 333 Auto Configuration Overview 333 What Is...
User's Configuration Guide
Page 311
... remote system: • TFTP • SFTP • SCP • FTP • HTTP (Web only) • HTTPS (Web only) • XMODEM (CLI only) On the PowerConnect 8100-series switches, you must be sure to provide the correct path to the original image. You can use the new image, you can revert to the...there is unable to complete the boot process due to the external USB port. The image that a route exists between the file system on the internal flash and a USB flash drive that is connected to a corrupt image or other problem, you can also copy files between the switch and ...
... remote system: • TFTP • SFTP • SCP • FTP • HTTP (Web only) • HTTPS (Web only) • XMODEM (CLI only) On the PowerConnect 8100-series switches, you must be sure to provide the correct path to the original image. You can use the new image, you can revert to the...there is unable to complete the boot process due to the external USB port. The image that a route exists between the file system on the internal flash and a USB flash drive that is connected to a corrupt image or other problem, you can also copy files between the switch and ...
User's Configuration Guide
Page 324
... the following commands to manage files that are on a USB device that is plugged into the USB flash port on a USB Flash Device (PowerConnect 8100-series switches only) Beginning in internal flash. | running -config • script file-name • startup-config • startup-log Password entry After you enter the copy command, the CLI...
... the following commands to manage files that are on a USB device that is plugged into the USB flash port on a USB Flash Device (PowerConnect 8100-series switches only) Beginning in internal flash. | running -config • script file-name • startup-config • startup-log Password entry After you enter the copy command, the CLI...
User's Configuration Guide
Page 465
... port How Does the Authentication Server Assign DiffServ Filters? The Internal Authentication Server (IAS) is the Internal Authentication Server? You can manually create entries in the database, or you can upload the IAS information to the switch. Table 20-1. The PowerConnect 8000-series and 8100-series switches allow the external 802.1X Authenticator or RADIUS server...
... port How Does the Authentication Server Assign DiffServ Filters? The Internal Authentication Server (IAS) is the Internal Authentication Server? You can manually create entries in the database, or you can upload the IAS information to the switch. Table 20-1. The PowerConnect 8000-series and 8100-series switches allow the external 802.1X Authenticator or RADIUS server...
User's Configuration Guide
Page 501
...to implement security rules on the connection method (for example, Telnet or HTTP) and/or the source IP address. The PowerConnect 8000-series and 8100-series switches support ACL configuration in this chapter include: • ACL Overview • Configuring ACLs (Web) • Configuring... or blocked. Ingress and egress ACLs can reside in a firewall router, a router connecting two internal networks, or a Layer 3 switch, such as a PowerConnect 8000-series and 8100-series switches. Configuring Access Control Lists 501 Egress ACLs provide the capability to any physical port, port-...
...to implement security rules on the connection method (for example, Telnet or HTTP) and/or the source IP address. The PowerConnect 8000-series and 8100-series switches support ACL configuration in this chapter include: • ACL Overview • Configuring ACLs (Web) • Configuring... or blocked. Ingress and egress ACLs can reside in a firewall router, a router connecting two internal networks, or a Layer 3 switch, such as a PowerConnect 8000-series and 8100-series switches. Configuring Access Control Lists 501 Egress ACLs provide the capability to any physical port, port-...
User's Configuration Guide
Page 543
...supports multiple devices that are configurable. VLAN membership rules that apply to a port are based on the IP phone). VLAN Tagging PowerConnect 8000-series and 8100-series switches support IEEE 802.1Q tagging. The administrator can receive tagged and untagged traffic. Tagging may be connected to an IP phone... and will automatically participate in the tag. VLAN tagging is required when a VLAN spans multiple switches, which is tagged internally with the native VLAN. Trunk ports can restrict the VLAN membership of all tagged frames are members of a trunk port. Configuring ...
...supports multiple devices that are configurable. VLAN membership rules that apply to a port are based on the IP phone). VLAN Tagging PowerConnect 8000-series and 8100-series switches support IEEE 802.1Q tagging. The administrator can receive tagged and untagged traffic. Tagging may be connected to an IP phone... and will automatically participate in the tag. VLAN tagging is required when a VLAN spans multiple switches, which is tagged internally with the native VLAN. Trunk ports can restrict the VLAN membership of all tagged frames are members of a trunk port. Configuring ...
User's Configuration Guide
Page 1080
...more bits in this route. The effect is that are more specific (have a lower distance metric and therefore a higher preference. The PowerConnect 8000-series and 8100-series switches support "Reject" routes, where any packet matching the route to any neighbor routers. • ipv6 route fc00::/7 null 254 ... Routing Without the Reject route, these undeliverable packets will also suppress a type of "Denial of Service" (DoS) attack where an internal host sends large numbers of packets to circulate through the network, following the default routes, until their TTL expires. The effect of ...
...more bits in this route. The effect is that are more specific (have a lower distance metric and therefore a higher preference. The PowerConnect 8000-series and 8100-series switches support "Reject" routes, where any packet matching the route to any neighbor routers. • ipv6 route fc00::/7 null 254 ... Routing Without the Reject route, these undeliverable packets will also suppress a type of "Denial of Service" (DoS) attack where an internal host sends large numbers of packets to circulate through the network, following the default routes, until their TTL expires. The effect of ...