Command Line Interface Guide
Page 18
show (mst 372 exit (mst 373 abort (mst 374 show spanning-tree 375 spanning-tree guard root 389 29 SSH Commands 391 ip ssh port 391 ip ssh server 391 crypto key generate dsa 392 crypto key generate rsa 393 ip ssh pubkey-auth 393 crypto key pubkey-chain ssh 394 user-key 395 key-string 396 show ip ssh 398 show crypto key mypubkey 399 show crypto key pubkey-chain ssh 400 30 Syslog Commands 401 logging on 401 logging 401 logging console 403 logging buffered 404 logging buffered size 404 clear logging 405 logging file 406 18 Contents
show (mst 372 exit (mst 373 abort (mst 374 show spanning-tree 375 spanning-tree guard root 389 29 SSH Commands 391 ip ssh port 391 ip ssh server 391 crypto key generate dsa 392 crypto key generate rsa 393 ip ssh pubkey-auth 393 crypto key pubkey-chain ssh 394 user-key 395 key-string 396 show ip ssh 398 show crypto key mypubkey 399 show crypto key pubkey-chain ssh 400 30 Syslog Commands 401 logging on 401 logging 401 logging console 403 logging buffered 404 logging buffered size 404 clear logging 405 logging file 406 18 Contents
Command Line Interface Guide
Page 25
... modes is used to navigate from one command mode to assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes. Each command mode has its own set of commands available for that particular command mode. at the system prompt (console prompt) displays a list of specific commands. Using the CLI 25 Using the...
... modes is used to navigate from one command mode to assist in configuring the device, the Command Line Interface (CLI) is divided into different command modes. Each command mode has its own set of commands available for that particular command mode. at the system prompt (console prompt) displays a list of specific commands. Using the CLI 25 Using the...
Command Line Interface Guide
Page 26
... password is reserved for tasks that are available in the User EXEC mode. The Interface Configuration mode configures specific interfaces in the User EXEC command mode unless the user is defined as a privileged user. This level is required. User EXEC Mode After logging into the device, the ...user is the User EXEC mode. In general, the User EXEC commands allow the user to the device Configuration mode. Console> 26 Using the CLI Only a limited subset of the device host name followed by the angle bracket (>). When starting...
... password is reserved for tasks that are available in the User EXEC mode. The Interface Configuration mode configures specific interfaces in the User EXEC command mode unless the user is defined as a privileged user. This level is required. User EXEC Mode After logging into the device, the ...user is the User EXEC mode. In general, the User EXEC commands allow the user to the device Configuration mode. Console> 26 Using the CLI Only a limited subset of the device host name followed by the angle bracket (>). When starting...
Command Line Interface Guide
Page 27
...access the Privileged EXEC mode and return to the User EXEC mode: Console> enable Enter Password: ****** Console# Console# disable Console> The exit (mst) command is displayed. The following steps: 1 At the prompt enter the enable command and press . To enter the Privileged EXEC mode from the Privileged ... EXEC mode, use because, many of the device host name followed by #. Console# To return from the Interface Configuration mode to the Global Configuration mode. The configure Privileged EXEC mode command is displayed as a whole, rather than just a specific interface. The Privileged...
...access the Privileged EXEC mode and return to the User EXEC mode: Console> enable Enter Password: ****** Console# Console# disable Console> The exit (mst) command is displayed. The following steps: 1 At the prompt enter the enable command and press . To enter the Privileged EXEC mode from the Privileged ... EXEC mode, use because, many of the device host name followed by #. Console# To return from the Interface Configuration mode to the Global Configuration mode. The configure Privileged EXEC mode command is displayed as a whole, rather than just a specific interface. The Privileged...
Command Line Interface Guide
Page 28
... mode, at the Privileged EXEC mode prompt enter the command configure and press . The Line Commands Global Configuration mode is used to the Privileged EXEC mode: Console# Console# configure Console(config)# exit Console# Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands modify specific interface operations. Console(config)# To return from the Global Configuration mode to...
... mode, at the Privileged EXEC mode prompt enter the command configure and press . The Line Commands Global Configuration mode is used to the Privileged EXEC mode: Console# Console# configure Console(config)# exit Console# Interface Configuration Mode and Specific Configuration Modes Interface Configuration mode commands modify specific interface operations. Console(config)# To return from the Global Configuration mode to...
Command Line Interface Guide
Page 29
... allow traffic based on Windows 2000 service packs. Go to begin the configuration procedure: Console> enable Console# configure Console(config)# Using the CLI 29 For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps: 1 Connect the... DB9 null-modem or cross over a direct connection to service definitions. Contains commands to enter the SSH ...
... allow traffic based on Windows 2000 service packs. Go to begin the configuration procedure: Console> enable Console# configure Console(config)# Using the CLI 29 For more information, see Dell™ PowerConnect™ 3500 Series User's Guide. 2 Enter the following steps: 1 Connect the... DB9 null-modem or cross over a direct connection to service definitions. Contains commands to enter the SSH ...
Command Line Interface Guide
Page 30
... arguments. To assist in using the CLI, there is displayed. • Partial keyword lookup - The character ? The matched keyword or parameters for the administrator, enter: Console(config)# username admin password alansmith When working with the exit command. For example, to ensure that require parameters, enter the required parameters after the...
... arguments. To assist in using the CLI, there is displayed. • Partial keyword lookup - The character ? The matched keyword or parameters for the administrator, enter: Console(config)# username admin password alansmith When working with the exit command. For example, to ensure that require parameters, enter the required parameters after the...
Command Line Interface Guide
Page 32
... brackets indicate a selection of channels, or selecting all commands. Returns the most recent command. For example, indicates the Enter key. For example, the command interface range port-channel has the option of either auto, on the console. Command Completion An appropriate error message displays if the entered command is entered without a parameter, it automatically defaults to...
... brackets indicate a selection of channels, or selecting all commands. Returns the most recent command. For example, indicates the Enter key. For example, the command interface range port-channel has the option of either auto, on the console. Command Completion An appropriate error message displays if the entered command is entered without a parameter, it automatically defaults to...
Command Line Interface Guide
Page 33
... operated through a Telnet connection from the console a Setup Wizard is a basic command-line interpreter similar to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. Address Table Commands Configures bridging Address Tables. Clock Commands Configures clock commands on the device. Command Groups 33 The first time you...
... operated through a Telnet connection from the console a Setup Wizard is a basic command-line interpreter similar to the Getting Started Guide and User Guide for configuring the PowerConnect device, details the procedures, and provides configuration examples. Address Table Commands Configures bridging Address Tables. Clock Commands Configures clock commands on the device. Command Groups 33 The first time you...
Command Line Interface Guide
Page 34
... the console and remote Telnet connection. Cofigures customizable login banners on the device. Configures TACACS+ commands. Configures tunnel routing configurations. Configures and manages IPv6 addresses on the device. Configures and displays TIC information. Ethernet Configuration GVRP Commands IGMP Snooping Commands IP Addressing Commands IPv6 Addressing Commands LACP Commands Line Commands LLDP Commands Login Banner Commands Management ACL Commands PHY Diagnostics Commands Power...
... the console and remote Telnet connection. Cofigures customizable login banners on the device. Configures TACACS+ commands. Configures tunnel routing configurations. Configures and manages IPv6 addresses on the device. Configures and displays TIC information. Ethernet Configuration GVRP Commands IGMP Snooping Commands IP Addressing Commands IPv6 Addressing Commands LACP Commands Line Commands LLDP Commands Login Banner Commands Management ACL Commands PHY Diagnostics Commands Power...
Command Line Interface Guide
Page 35
...Line Configuration Specifies the authentication method list when accessing a Line higher privilege level from a remote telnet or console. Creates Layer 2 ACLs. Configuration Specifies the login authentication method list for HTTPS server users. Global Configuration Specifies authentication ...a line. Set permit conditions for HTTP server users. Establishes a username-based authentication system. Line Configuration Global Configuration Global Configuration ACL Commands Command Group ip access-list permit (IP) deny (IP) mac access-list permit (MAC) Description Creates Layer 2 ACLs. Sets a...
...Line Configuration Specifies the authentication method list when accessing a Line higher privilege level from a remote telnet or console. Creates Layer 2 ACLs. Configuration Specifies the login authentication method list for HTTPS server users. Global Configuration Specifies authentication ...a line. Set permit conditions for HTTP server users. Establishes a username-based authentication system. Line Configuration Global Configuration Global Configuration ACL Commands Command Group ip access-list permit (IP) deny (IP) mac access-list permit (MAC) Description Creates Layer 2 ACLs. Sets a...
Command Line Interface Guide
Page 53
...Global Configuration Global Configuration SSH Public Key SSH Public Key Privileged EXEC Privileged EXEC Privileged EXEC Syslog Commands Command Group logging on severity. Logs messages to the console based on severity. Limits syslog messages displayed from a SSH server. Generates RSA key pairs. .... Enters SSH Public Key-chain configuration mode. Access Mode Global Configuration Global Configuration Global Configuration Global Configuration Command Groups 53 SSH Commands Command Group ip ssh port ip ssh server crypto key generate dsa crypto key generate rsa ip ssh pubkey-...
...Global Configuration Global Configuration SSH Public Key SSH Public Key Privileged EXEC Privileged EXEC Privileged EXEC Syslog Commands Command Group logging on severity. Logs messages to the console based on severity. Limits syslog messages displayed from a SSH server. Generates RSA key pairs. .... Enters SSH Public Key-chain configuration mode. Access Mode Global Configuration Global Configuration Global Configuration Global Configuration Command Groups 53 SSH Commands Command Group ip ssh port ip ssh server crypto key generate dsa crypto key generate rsa ip ssh pubkey-...
Command Line Interface Guide
Page 65
... configuring the device from an internal buffer based on severity. Sets the minimum required length for configuration and enters the line configuration command mode. Configures a TCP port for use by a web browser to be configured from a browser. Enables the device to configure...ip ssh port ip ssh pubkey-auth ip ssh server lacp system-priority line logging logging buffered logging buffered size logging console logging file logging on mac access-list management access-class management access-list management logging password min-length Specifies authentication methods...
... configuring the device from an internal buffer based on severity. Sets the minimum required length for configuration and enters the line configuration command mode. Configures a TCP port for use by a web browser to be configured from a browser. Enables the device to configure...ip ssh port ip ssh pubkey-auth ip ssh server lacp system-priority line logging logging buffered logging buffered size logging console logging file logging on mac access-list management access-class management access-list management logging password min-length Specifies authentication methods...
Command Line Interface Guide
Page 72
... applying configuration changes. LC (Line Configuration) Mode Command Group autobaud enable authentication exec-timeout history history size login authentication password password-aging speed Description Configures the line for a remote telnet or console. Configures the interval that the system waits until ...the MST region configuration mode and applies all configuration changes. 72 Command Modes switchport trunk allowed vlan switchport trunk native vlan traffic-shape Adds or removes VLANs from a remote telnet or console. Specifies a password on an egress port. Configures the baud ...
... applying configuration changes. LC (Line Configuration) Mode Command Group autobaud enable authentication exec-timeout history history size login authentication password password-aging speed Description Configures the line for a remote telnet or console. Configures the interval that the system waits until ...the MST region configuration mode and applies all configuration changes. 72 Command Modes switchport trunk allowed vlan switchport trunk native vlan traffic-shape Adds or removes VLANs from a remote telnet or console. Specifies a password on an egress port. Configures the baud ...
Command Line Interface Guide
Page 81
... defined. Uses the line password for authentication. This has the same effect as the default list of all RADIUS servers for authentication. AAA Commands 81 NOTE: On the console, login succeeds without any authentication check if the authentication method is checked. Character string used to the default configuration. Uses the list of...
... defined. Uses the line password for authentication. This has the same effect as the default list of all RADIUS servers for authentication. AAA Commands 81 NOTE: On the console, login succeeds without any authentication check if the authentication method is checked. Character string used to the default configuration. Uses the list of...
Command Line Interface Guide
Page 82
...enable {default | list-name} method1 [method2...] • no authentication. 82 AAA Commands Uses no aaa authentication enable {default | list-name} • default - Console(config)# aaa authentication login radius local none aaa authentication enable The aaa authentication enable Global... Configuration mode command defines authentication method lists for authentication. The method argument identifies...
...enable {default | list-name} method1 [method2...] • no authentication. 82 AAA Commands Uses no aaa authentication enable {default | list-name} • default - Console(config)# aaa authentication login radius local none aaa authentication enable The aaa authentication enable Global... Configuration mode command defines authentication method lists for authentication. The method argument identifies...
Command Line Interface Guide
Page 83
...Uses the list of authentication are used with the enable authentication command. • The additional methods of all TACACS+ servers for authentication. Example The following example sets the enable password for a remote telnet or console. If no form of all methods return an error, specify... none as the final method in the command line. • All aaa authentication enable default requests sent by the aaa authentication...
...Uses the list of authentication are used with the enable authentication command. • The additional methods of all TACACS+ servers for authentication. Example The following example sets the enable password for a remote telnet or console. If no form of all methods return an error, specify... none as the final method in the command line. • All aaa authentication enable default requests sent by the aaa authentication...
Command Line Interface Guide
Page 84
... list created with the aaa authentication enable command. Command Mode Line Configuration mode. Uses the indicated list created with the aaa authentication login command. Command Mode Line Configuration mode. 84 AAA Commands Default Configuration Uses the default set with the aaa authentication login command. • list-name - Console(config)# line console Console(config-line)# login authentication default enable authentication...
... list created with the aaa authentication enable command. Command Mode Line Configuration mode. Uses the indicated list created with the aaa authentication login command. Command Mode Line Configuration mode. 84 AAA Commands Default Configuration Uses the default set with the aaa authentication login command. • list-name - Console(config)# line console Console(config-line)# login authentication default enable authentication...
Command Line Interface Guide
Page 85
..., not if it fails. Specify at least one from a console. Default Configuration The local user database is checked. User Guidelines • The additional methods of authentication are no form of this command. Uses no ip http authentication • method1 [method2...] -...Keyword local none radius tacacs Description Uses the local username database for HTTP server users. Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for authentication.
..., not if it fails. Specify at least one from a console. Default Configuration The local user database is checked. User Guidelines • The additional methods of authentication are no form of this command. Uses no ip http authentication • method1 [method2...] -...Keyword local none radius tacacs Description Uses the local username database for HTTP server users. Console(config)# line console Console(config-line)# enable authentication default ip http authentication The ip http authentication Global Configuration mode command specifies authentication methods for authentication.
Command Line Interface Guide
Page 243
Default Configuration If the line is not specified, the default value is console. Console> show line Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600 Databits: 8 Parity: none Stopbits: 1 Telnet configuration: Interactive timeout: 10 minutes 10 seconds History: 10 SSH configuration: Interactive timeout: 10 minutes 10 seconds History: 10 Line Commands 243 Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays the line configuration.
Default Configuration If the line is not specified, the default value is console. Console> show line Console configuration: Interactive timeout: Disabled History: 10 Baudrate: 9600 Databits: 8 Parity: none Stopbits: 1 Telnet configuration: Interactive timeout: 10 minutes 10 seconds History: 10 SSH configuration: Interactive timeout: 10 minutes 10 seconds History: 10 Line Commands 243 Command Mode User EXEC mode. User Guidelines There are no user guidelines for this command. Examples The following example displays the line configuration.