Back to Contents Page

Configuring System Information

Dell™ PowerConnect™ 3324/3348 User's Guide

  Defining General Device Information

  Managing Logs

  Defining Device IP Addresses

  Managing Device Security

  Defining SNMP Parameters

  Managing Files

  Defining Advanced Settings


This section provides information about defining system parameters including security features, downloading device software, and resetting the device. To open the System page:

System Page


Defining General Device Information

The General page contains links to pages that allow network managers to configure device parameters, including:

General Page

Viewing the Asset Page

The Asset page contains parameters for configuring general device information, including the system name, location, and contact, the system MAC Address, System Object ID, date, time, and System Up Time. To open the Asset page:

Asset Page

The Asset page contains the following fields:

Defining system information:

  1. Open the Asset page.

  2. Define the System Name, System Contact, System Location, Date, Asset Tag, and Time fields.

  3. Click Apply Changes. The system parameters are defined, and the device is updated.

Initiating a Telnet Session:

  1. Open the Asset page.

  2. Click Telnet. A Telnet session is initiated.

Configuring Device Information Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Asset page.

CLI Command

Description

hostname name

Specifies or modifies the device host name.

snmp-server contact text

Sets up a system contact.

snmp-server location text

Enters information on where the device is located.

clock set hh:mm:ss day month year

Manually sets the system clock and date. Note the different date format.

show clock

Displays the time and date from the system clock.

show system id

Displays the service tag information.

show system

Displays system information.

asset tag

Displays the device asset tag.

The following is an example of the CLI commands:

Console (config)# hostname dell

Console (config)# snmp-server contact Dell_Tech_Supp

Console (config)# snmp-server location New_York

Console (config)# exit

Console # exit

Console (config)# asset-tag lqwepot

Console> clock set 13:32:00 7 Mar 2002

Console> show clock

13:32:00 7 Mar 2002

console# show system

System Description: Ethernet Stackable Switching System

System Up Time (days,hour:min:sec): 0,00:30:58

System Contact: Dell_Tech_Supp

System Name: dell

System Location: New_York

MAC Address: 00:00:b0:22:33:44

Sys Object ID: 1.3.6.1.4.1.674.10895.3004

Power supply Source Status

------------------ --------------------- -------------

Internal Power Supply Internal redundant OK unit1

External Power Supply External OK unit1

Internal PowerSupply Internal redundant OK unit2

External PowerSupply External OK unit2

Internal PowerSupply Internal redundant OK unit3

External PowerSupply External OK unit3

Internal PowerSupply Internal redundant OK unit6

External PowerSupply External OK unit6

Viewing System Health Information

The System Health page physical device hardware information. To open the System Health page:

System Health Page

The System Health page contains the following fields:

Viewing System Health Information Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the System Health page.

CLI Command

Description

show system

Displays system information.

The following is an example of the CLI commands:

Console> show system

System Description: Ethernet Stackable Switching System

System Up Time (days,hour:min:sec): 0,00:08:56

System Contact: Dell_Tech_Supp

System Name: dell

System Location: New_York

Viewing the Versions Page

The Versions page contains information about the hardware and software versions currently running. To open the Versions page:

Versions Page

The Versions page contains the following information:

Displaying Device Versions using the CLI

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Versions page.

CLI Command

Description

show version

Displays the system version information.

The following is an example of the CLI commands:

Console> show version

SW version 1.0.0.01 (date 14-Feb-2003 time 14:42:16 )

Boot version 1.30.11 ( date 27-Jan-2003 time 10:06:02 )

HW version 01.01.01

Resetting the Device

The Reset page allows users to reset the device from a remote location. To open the Reset page:

Reset Page

NOTE: Save all changes to the Running Configuration file before resetting the device to prevent the current device configuration from being lost. For more information about saving Configuration files, see "Managing Files".

Resetting the device:

  1. Open the Reset page.

  2. Click Reset. A confirmation message displays:

Device Reset Confirmation Message

  1. Click OK. The device is reset. After the device is reset, the user is prompted for a user name and password.

Resetting the Device Using the CLI

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Reset page.

CLI Command

Description

reload

Reloads the operating system.

The following is an example of the CLI commands:

Console >reload

This command will reset the whole system and disconnect your current

session. Do you want to continue (y/n) [n] ?


Managing Logs

The Logs page contains links to various log pages. To open the Logs page:

Logs Page

The Logs page contains links to the following pages:

Defining Global Log Parameters

The System Logs enable you to view significant events in real time and keep a record of these events for later use. This feature provides the ability to log and manage events and report errors.

Event messages have a unique format, as per the SYSLOG RFC recommended message format for all error reporting; for example, Syslog+ local device reporting. Messages are assigned a severity code and include a message mnemonic, which identifies the source application generating the message. Messages are filtered based on their urgency or relevancy. The severity of each message determines the set of event logging devices to which messages are sent for each event logging device. The following table contains the Log Severity Levels:

Severity Type

Severity Level

Description

Emergency

0

Indicates that the system is not functioning.

Alert

1

Indicates that the system needs immediate attention.

Critical

2

Indicates that the system is in a critical state.

Error

3

Indicates that a system error has occurred.

Warning

4

Indicates that a system warning has occurred.

Notice

5

Indicates that the system is functioning properly, but system notice has occurred.

Informational

6

Provides device information.

Debug

7

Provides detailed information about the log.

Log Severity Levels

The Global Log Parameters page enables you to define which events are recorded to which logs. It contains fields for enabling logs globally and parameters for defining log parameters. The Severity log messages are listed from the highest to the lowest severity. To open the Global Log Parameters page:

Global Log Parameters Page

The Global Log Parameters page contains the following fields:

NOTE: When a severity level is selected, all severity level choices above the selection are selected automatically.

The Global Log Parameters page also contains check boxes that correspond to a distinct logging system:

Enabling Logs:

  1. Open the Global Log Parameters page.

  2. Select Enable in the Logging drop-down list.

  3. Select the log type and log severity in the Global Log Parameters check boxes.

  4. Click Apply Changes. The log settings are saved, and the device is updated.

Enabling Logs Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Global Log Parameters page.

CLI Command

Description

logging on

Enables error message logging.

logging ip-address [port port] [severity level] [facility facility] [description text]

Logs messages to a syslog server. For a list of the Severity levels, see "Log Severity Levels".

logging console level

Limits messages logged to the console based on severity.

logging buffered level

Limits syslog messages displayed from an internal buffer (RAM) based on severity.

logging file level

Limits syslog messages sent to the logging file based on severity.

clear logging

Clears logs.

The following is an example of the CLI commands:

Console (config)# logging on

Console (config)# logging console errors

Console (config)# logging buffered debugging

Console (config)# logging file alerts

Console (config)# clear logging

Displaying RAM Log Table

The RAM Log Table contains information about log entries kept in RAM, including the time the log was entered, the log severity, and a description of the log. To open the RAM Log Table page:

RAM Log Table Page

The RAM Log Table page contains the following fields:

Removing Log Information:

  1. Open the RAM Log Table page.

  2. Click Clear Log. The log information is removed from the RAM Log Table/Log File Table, and the device is updated.

Viewing the RAM Log Table Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the RAM Log Table page.

CLI Command

Description

show logging

Displays the state of logging and the syslog messages stored in the internal buffer.

clear logging

Clears logs.

The following is an example of the CLI commands:

Console # show logging

Console logging: level debugging. Console Messages: 0 Dropped (severity).

Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max.

File logging: level notifications. File Messages: 0 Dropped (severity).

Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped (severity).

Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped (severity).

2 messages were not logged (resources)

Buffer log:

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e0, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e1, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e2, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e3, changed state to up

11-Aug-2002 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e0, changed state to down

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e1, changed state to down

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e2, changed state to down

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e3, changed state to down

Console # clear logging

clear logging buffer [confirm]

Console #

Console # clear logging file

clear logging buffer [confirm]

Console #

Displaying the Log File Table

The Log File Table contains information about log entries saved to the Log File in FLASH, including the time the log was entered, the log severity, and a description of the log message. To open the Log File Table page:

Log File Table

The Log File Table contains the following fields:

Displaying the Log File Table Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Log File Table.

CLI Command

Description

show logging file

Displays the state of logging and the syslog messages stored in the logging file.

clear logging

Clears all log files.

The following is an example of the CLI commands:

Console # show logging file

Console logging: level debugging. Console Messages: 0 Dropped (severity).

Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max.

File logging: level notifications. File Messages: 0 Dropped (severity).

Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped (severity).

Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped (severity).

2 messages were not logged (resources)

File log:

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e0, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e1, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e2, changed state to up

11-Aug-2002 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/e3, changed state to up

11-Aug-2002 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e0, changed state to down

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e1, changed state to down

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e2, changed state to down

11-Aug-2002 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet1/e3, changed state to down

Viewing the Remote Log Server Settings Page

The Remote Log Server Settings page contains fields for viewing the available Log Servers. In addition, new log servers can be defined and the severity of the logs sent to each server. To open the Remote Log Server Settings page:

Remote Log Server Settings Page

The Remote Logs Server Settings page contains the following fields:

The Remote Logs Server Settings page also contains a severity list. The severity definitions are the same as the severity definitions on the "Global Log Parameters Page".

Sending logs to a server:

  1. Open the Remote Logs Server Settings page.

  2. Select a server from the Available Servers drop-down list.

  3. Define the UDP Port, Facility, and Description fields.

  4. Select the log severity in the Severity to Include check boxes.

  5. Click Apply Changes. The log settings are saved, and the device is updated.

Defining a new server:

  1. Open the Remote Logs Server Settings page.

  2. Click Add. The Add a Log Server page opens.

Add a Log Server Page

In addition to the fields in the Remote Logs Server Settings page, the Add a Log Server page contains the following field:

To add a log server:

  1. Define the New Log Server IP Address, UDP Port, Facility, and Description fields, and select the Severity to Include check boxes.

  2. Click Apply Changes. The server is defined and added to the Available Servers list.

Displaying the Log Servers Table:

  1. Open the Remote Logs Server Settings page.

  2. Click Show All. The Log Servers Table page opens.

Log Servers Table Page

Removing a Log Server from the Log Servers Table page:

  1. Open the Remote Logs Server Settings page.

  2. Click Show All. The Log Servers Table page opens.

  3. Select a Log Servers Table entry.

  4. Check the Remove check box to remove the server(s).

  5. Click Apply Changes. The Log Servers Table entry is removed and the device is updated.


Defining Device IP Addresses

The IP Addressing page contains links for assigning interface and default gateway IP addresses and defining ARP and DHCP parameters for the interfaces. To open the IP Addressing page:

IP Addressing Page

The IP Addressing page contains links to the following pages:

Defining Default Gateways

The Default Gateway page allows network managers to assign Gateway devices. Packets are forwarded to the default IP when frames are sent to a remote network. The configured IP address must belong to the same IP address subnet of one of the IP interfaces. To open the Default Gateway page:

Default Gateway Page

The Default Gateway page contains the following fields:

Selecting a Gateway device:

  1. Open the Default Gateway page.

  2. Select an IP address in the Default Gateway drop-down list.

  3. Check the Active check box.

  4. Click Apply Changes. The Gateway device is selected, and its status displays in the Active field.

Adding a Gateway device:

  1. Open the Default Gateway page.

  2. Click Add. The Add New Default Gateway page opens.

Add New Default Gateway

  1. Define the Default Gateway IP Address field.

OR

Set the new gateway as active by checking the check box.

  1. Click Apply Changes. The new default Gateway device is defined, and the device is updated.

Displaying the Default Gateway Table:

  1. Open the Default Gateway page.

  2. Click Show All. The Default Gateway Table opens.

Default Gateway Table Page

Removing a Default Gateway device:

  1. Open the Default Gateway page.

  2. Click Show All. The Default Gateway Table page opens.

  3. Select a Default Gateway Table entry.

  4. Check the Remove check box to remove default gateways.

  5. Click Apply Changes. The Default Gateway Table entry is removed, and the device is updated.

Defining Gateway devices Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Default Gateway page.

CLI Command

Description

ip default-gateway ip-address1 [ip-address2.]

Defines a default gateway.

no ip default-gateway [ip-address]

Removes a default gateway.

The following is an example of the CLI commands:

Console (config)# ip default-gateway 196.210.10.1

Console (config)# no ip default-gateway 196.210.10.1

Defining IP Interfaces

The IP Interface Parameters page contains parameters for assigning IP addresses to interfaces. To open the IP Interface Parameters page:

IP Interface Parameters Page

The IP Interface Parameters page contains the following fields:

Adding an IP Interface:

  1. Open the IP Interface Parameters page.

  2. Click Add. The Add a Static IP Interface page opens:

Add A Static IP Interface Page

  1. Define the IP Address, Interface, Network Mask, or the Prefix Length fields.

  2. Select the interface to which the IP interface will be assigned.

  3. Click Apply Changes. The new interface is added, and the device is updated.

Displaying the IP Interface Table:

  1. Open the IP Interface Parameters page.

  2. Click Show All. The IP Interface Table page opens. The IP Interface Table contains the same fields as the "Defining IP Interfaces".

IP Interface Table Page

Deleting IP addresses:

  1. Open the IP Interface page.

  2. Click Show All. The IP Interface Table page opens.

  3. Select an entry in the IP Interface Table.

  4. Check the Remove check box to remove IP addresses.

  5. Click Apply Changes. The IP address is deleted, and the device is updated.

Defining IP Interfaces Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the IP Interface Parameters page.

CLI Command

Description

ip address ip-address {mask | prefix-length}

Sets an IP address.

no ip address [ip-address]

Removes an IP address

show ip interface [ethernet interface-number | vlan vlan-id | port-channel number]

Displays the usability status of interfaces configured for IP.

The following is an example of the CLI commands:

Console (config)# interface vlan 1

Console (config-if)# ip address 131.108.1.27 255.255.255.0

Console (config-if)# no ip address 131.108.1.27

Console (config-if)# exit

Console# show ip interface vlan 1

Internet address is 10.7.1.192/24

console# show ip interface vlan 204

IP Address Directed Broadcast

----------------------- --------------------

146.1.0.132/29 disable

console#

Defining DHCP IP Interfaces

The DCHP IP Interface page specifies the DCHP client setting for the device per interface.

DHCP IP Interface Page

The DCHP IP Interface page contains the following fields:

Adding a DCHP IP Interface:

  1. Open the DHCP IP Interface page.

  2. Click Add. The Add DHCP IP Interfaces page opens.

Add DHCP IP Interfaces

  1. Select the Interface and define the Host Name.

  2. Click Apply Changes. The new DHCP IP Interface is added, and the device is updated.

Modifying a DCHP IP Interface:

  1. Open the DHCP IP Interface page.

  2. Modify the Interface field.

  3. Click Apply Changes. The entry is modified, and the device is updated.

Displaying the DHCP IP Interfaces Table:

  1. Open the DHCP IP Interface page.

  2. Click Show All. The DHCP IP Interfaces Table Page opens.

DHCP IP Interfaces Table Page

Deleting a DHCP IP Interface:

  1. Open the DHCP IP Interface page.

  2. Click Show All. The DHCP IP Interfaces Table opens.

  3. Select a DHCP client entry.

  4. Check the Remove check box to remove DHCP client entries.

  5. Click Apply Changes. The DHCP IP Interfaces Table entries are deleted, and the device is updated.

Defining DCHP Clients Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the DHCP IP Interface page.

CLI Command

Description

ip address-dhcp [hostname host-name]

Acquires an IP address on an ethernet interface from DHCP.

The following is an example of the CLI commands:

Console (config)# interface ethernet 1/e8

Console (config-if)# ip address-dhcp hostname marketing

Configuring ARP

The Address Resolution Protocol (ARP) is a TCP/IP protocol that converts IP addresses into physical addresses. The static entries can be defined in the ARP Table. When static entries are defined, a permanent entry is entered and is used to translate IP address to MAC addresses. To open the ARP Settings page:

ARP Settings Page

The ARP Settings page contains the following fields:

Adding a static ARP Table entry:

  1. Open the ARP Settings page.

  2. Click Add. The Add ARP Entry page opens.

Add ARP Entry Page

  1. Select an Interface and define its IP Address and MAC address fields.

  2. Click Apply Changes. The ARP Table entry is added, and the device is updated.

Displaying the ARP Table:

  1. Open the ARP Setting page.

  2. Click Show All. The ARP Table page opens.

ARP Table Page

Deleting ARP Table entry:

  1. Open the ARP Setting page.

  2. Click Show All. The ARP Table page opens.

  3. Select a table entry.

  4. Check the Remove check box

  5. Click Apply Changes. The ARP Table entry is deleted, and the device is updated.

Configuring ARP Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the ARP Settings page.

CLI Command

Description

arp ip_addr hw_addr {ethernet interface-number | vlan vlan-id | port-channel number}

Adds a permanent entry in the ARP cache.

arp timeout seconds

Configures how long an entry remains in the ARP cache.

show arp

Displays entries in the ARP Table.

no arp

Removes an ARP entry from the ARP Table.

The following is an example of the CLI commands:

console(config)# arp 146.1.0.131 00-00-55-66-77-00 ethernet 1/e1

Console (config)# exit

Console# arp timeout 12000

Console# show arp

Interface IP address HW address Status

---- ---------- ----------------- -------

1/e1 10.7.1.102 00:10:B5:04:DB:4B Dynamic

2/e2 10.7.1.135 00:50:22:00:2A:A4 Static


Managing Device Security

The Management Security page provides access to security pages that allow network administrators to set security parameters for ports, device management methods, user, and server security. To open the Management Security page:

Management Security Page

This section includes the following topics:

Defining Access Profiles

The Access Profiles page allows network managers to define profiles and rules for accessing the device. Management method access can be limited to a specific user group by Ingress Ports, Source IP address, and/or Subnet Masks. Management Access methods can be separately defined for:

Users accessing one management service may differ from users managing a separate management service. Management Access Lists are comprised of rules that determine how the device is managed and by whom. To open the Access Profiles page:

Access Profiles Page

The Access Profiles page contains the following fields:

NOTE: Active profiles cannot be removed.

Activating a Profile:

  1. Open the Access Profiles page.

  2. Select an Access Profile in the Access Profile field.

  3. Check the Set Access Profile Active check box.

  4. Click Apply Changes. The Access Profile is activated.

Adding an Access Profile:

Rules act as filters for determining rule priority, the device management method, interface type, source IP address and network mask, and the device management access action. Users can be blocked or permitted management access. Rule priority sets the order of rule application in a profile.

To define rules for an access profile:

  1. Open the Access Profiles page.

  2. Click Add Profile. The Add An Access Profile page opens.

Add An Access Profile Page

The Add An Access Profile page contains the following fields:

  1. Define the Access Profile Name field.

  2. Define the Rule Priority, Management Method, Interface, Source IP, Network Mask, Prefix Length, and Action fields.

  3. Click Apply Changes. The new Access Profile is added, and the device is updated.

Adding Rules to Access Profile:

NOTE: The first rule must be defined to begin matching traffic to access profiles.
  1. Open the Access Profiles page.

  2. Click Add Rule to Profile. The Add An Access Profile Rule page opens.

Add An Access Profile Rule Page

The Add An Access Profile Rule page contains the following fields:

  1. Define the Access Profile Name field.

  2. Define the Rule Priority, Management Method, Interface, Source IP, Network Mask, Prefix Length, and Action fields.

  3. Click Apply Changes. The rule is added, and the device is updated.

Viewing the Profile Rules Table:

NOTE: The order in which rules appear in the Profile Rules Table is important. Packets are matched to the first rule which meets the rule criteria.
  1. Open the Access Profiles page.

  2. Click Show All.The Profile Rules Table page opens.

Profile Rules Table Page

  1. Click Apply Changes.

Removing a Rule:

NOTE: When a rule is deleted, the profile name is also deleted.
  1. Open the Access Profiles page.

  2. Click Show All.The Profile Rules Table opens.

  3. Select a rule in the Profile Rules Table page.

  4. Check the Remove check box.

  5. Click Apply Changes. The rule is deleted, and the device is updated.

Defining Access Profiles Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Access Profiles page.

CLI Command

Description

management access-list name

Defines an access-list for management, and enters the access-list context for configuration.

permit [ethernet interface-number | vlan vlan-id | port-channel number] [service service]

Sets port permitting conditions for the management access list.

permit ip-source ip-address [mask mask | prefix-length] [ethernet interface-number | vlan vlan-id | port-channel number] [service service]

Sets port permitting conditions for the management access list, and the selected management method.

deny [ethernet interface-number | vlan vlan-id | port-channel number] [service service]

Sets port denying conditions for the management access list, and the selected management method.

deny ip-source ip-address [mask mask | prefix-length] [ethernet interface-number | vlan vlan-id | port-channel number] [service service]

Sets port denying conditions for the management access list, and the selected management method.

management access-class {console-only | name}

Defines which access-list is used as the active management connections.

show management access-list [name]

Displays the active management access-lists.

show management access-class

Displays information about management access-class.

The following is an example of the CLI commands:

Console (config)# management access-list mlist

Console (config-macl)# permit ethernet 1/e1

Console (config-macl)# permit ethernet 2/e9

Console (config-macl)# deny ethernet 1/e2

Console (config-macl)# deny ethernet 2/e10

Console (config-macl)# exit

Console (config)# management access-class mlist

Console (config)# exit

Console# show management access-list

mlist

-----

permit ethernet 1/e1

permit ethernet 2/e9

! (Note: all other access implicitly denied)

Console> show management access-class

Management access-class is enabled, using access list mlist

Defining Authentication Profiles

The Authentication Profiles page allows network managers to select the user authentication method on the device. User authentication occurs:

User authentication can also be set to None.

User authentication occurs in the order the methods are selected. For example, if both the Local and RADIUS options are selected, the user is authenticated first locally. If the local user database is empty, the user is then authenticated via the RADIUS server.

If an error occurs during the authentication, the next selected method is used. To open the Authentication Profiles page:

Authentication Profiles Page

The Authentication Profiles page contains the following options lists:

Selecting an Authentication Profile:

  1. Open the Authentication Profiles page.

  2. Select a profile in the Authentication Profile Name field.

  3. Select the authentication method using the arrow icons.

  4. Click Apply Changes. The user authentication profile is updated to the device.

Adding an Authentication Profile:

  1. Open the Authentication Profile page.

  2. Click Add. The Add Authentication Method Profile Name page opens.

Add Authentication Profile Page

Displaying the Show All Authentication Profiles Page:

  1. Open the Authentication Profiles page.

  2. Click Show All. The Open the Authentication Profile page opens:

Authentication Profile Page

Deleting an Authentication Profile:

  1. Open the Authentication Profiles page.

  2. Click Show All. The Open the Authentication Profile page opens.

  3. Select an authentication profile.

  4. Check the Remove check box.

  5. Click Apply Changes. The authenticating profile is deleted.

Configuring an Authentication Profile Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Authentication Profiles page.

CLI Command

Description

aaa authentication login {default | list-name} method1 [method2.]

Configures login authentication.

no aaa authentication login {default | list-name

Removes a login authentication profile.

The following is an example of the CLI commands:

Console (config)# aaa authentication login default radius local enable none

Console (config)# no aaa authentication login default

Assigning Authentication Profiles

After Authentication Profiles are defined, the Authentication Profiles can be applied to Management Access methods. For example, console users can be authenticated by Authentication Method Lists 1, while Telnet users are authenticated by Authentication Method List 2. To open the Management Authentication page:

Select Authentication Page

The Select Authentication page contains the following fields:

Applying an Authentication List to Console Sessions:

  1. Open the Select Authentication page.

  2. Select an Authentication Profile in the Console field.

  3. Click Apply Changes. Console sessions are assigned an Authentication List.

Applying an Authentication Profile to Telnet Sessions:

  1. Open the Select Authentication page.

  2. Select an Authentication Profile in the Telnet field.

  3. Click Apply Changes. Telnet sessions are assigned an Authentication List.

Applying an Authentication Profile to Secure Telnet (SSH) Sessions:

  1. Open the Select Authentication page.

  2. Select an Authentication Profile in the Secure Telnet (SSH) field.

  3. Click Apply Changes. Secure Telnet (SSH) sessions are assigned an Authentication Profile.

Assigning HTTP Sessions a Authentication Sequence:

  1. Open the Select Authentication page.

  2. Select an authentication sequence in the HTTP field.

  3. Click Apply Changes. HTTP sessions are assigned an authentication sequence.

Assigning Secure HTTP Sessions a Authentication Sequence:

  1. Open the Select Authentication page.

  2. Select an authentication sequence in the Secure HTTP field.

  3. Click Apply Changes. Secure HTTP sessions are assigned an authentication sequence.

Assigning Access Authentication Profiles or Sequences Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Select Authentication page.

CLI Command

Description

enable authentication [default | list-name]

Specifies the authentication method list when accessing a higher privilege level from a remote Telnet or console.

login authentication [default | list-name]

Specifies the login authentication method list for a remote Telnet or console.

ip http authentication method1 [method2.]

Specifies authentication methods for http servers.

ip https authentication method1 [method2.]

Specifies authentication methods for https servers.

show authentication methods

Displays information about the authentication methods.

The following is an example of the CLI commands:

Console (config-line)# enable authentication default

Console (config-line)# login authentication default

Console (config-line)# exit

Console (config)# ip http authentication radius local

Console (config)# ip https authentication radius local

Console (config)# exit

Console# show authentication methods

Login Authentication Method Lists

---------------------------------

Default: Radius, Local, Line

Console_Login: Line, None

Enable Authentication Method Lists

----------------------------------

Default: Radius, Enable

console> enable: Enable, None

Line Login Method List Enable Method List

------- ----------------- -------------------

Console Console_Login Console_Enable

Telnet Default Default

SSH Default Default

HTTP: Radius, local

HTTPS: Radius, local

Defining the Local User Databases

The Local User Database page allows network managers to define users, passwords and access levels. Password are limited to a maximum of 16 characters. To open the Local User Database page:

Local User Database Page

The Local User Database page contains the following fields:

Assigning access rights to a user:

  1. Open the Local User Database page.

  2. Select a user in the User Name field.

  3. Define the Access Level, and Password fields.

  4. Click Apply Changes. The user access rights and passwords are defined, and the device is updated.

Defining a New User:

  1. Open the Local User Database page.

  2. Click Add. The Add User page opens:

Add User Page

  1. Define a new user name in the User Name, Access Level (1-15), Password, and Confirm Password fields.

  2. Click Apply Changes. The new user is defined, and the device is updated.

Displaying the Local User Table:

  1. Open the Local User Database page.

  2. Click Show All. The Local User Table page opens.

Local User Table Page

Deleting Users:

  1. Open the Local User Database page.

  2. Click Show All. The Local User Table page opens.

  3. Select a User Name.

  4. Check the Remove check box.

  5. Click Apply Changes. The user is deleted, and the device is updated.

Assigning Users Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Local User Database page.

CLI Command

Description

username name [password password] [privilege level] [encrypted]

Establishes a username-based authentication system.

The following is an example of the CLI commands:

Console (config)# username bob password lee privilege 15

Defining Line Passwords

The Line Passwords page allows network managers to define line passwords for management methods. Passwords are limit to maximum of 16 characters. To open the Line Passwords page:

Line Password Page

The Line Password page contains the following fields:

Defining line passwords for console sessions:

  1. Open the Line Password page.

  2. Define the Line Password for Console field.

  3. Click Apply Changes. The line password for console sessions is defined, and the device is updated.

Defining line passwords for Telnet sessions:

  1. Open the Line Password page.

  2. Define the Line Password for Telnet field.

  3. Click Apply Changes. The line password for the Telnet sessions is defined, and the device is updated.

Defining line passwords for secure Telnet sessions:

  1. Open the Line Password page.

  2. Define the Line Password for Secure Telnet field.

  3. Click Apply Changes. The line password for Secure Telnet sessions is defined, and the device is updated.

Assigning Line Passwords Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Line Password page.

CLI Command

Description

password password [encrypted]

Specifies a password on a line.

The following is an example of the CLI commands:

Console (config-line)# password dell

Defining Enable Password

The Modify Enable Password page sets a local password to control access to Normal, Privilege, and Global Configuration. To open the Modify Enable Password page.

Modify Enable Password Page

The Modify Enable Password page contains the following fields:

Defining a new Enable Password:

  1. Open the Modify Enable Password page.

  2. Define the Select Enable Access Level, Password, and Confirm Password fields.

  3. Click Apply Changes. The new Enable password is defined, and the device is updated.

Assigning Enable Passwords Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Modify Enable Password page.

CLI Command

Description

enable password [level level] password [encrypted]

Sets a local password to control access to user and privilege levels.

show users accounts

Displays information about the local user database.

The following is an example of the CLI commands:

Console (config)# enable password level 15 dell

Console# show users accounts

Username Privilege

--------- ---------

Bob 15

Robert 15

Configuring RADIUS Global Parameters

Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized authentication method for:

To open the RADIUS Settings page:

RADIUS Settings Page

The RADIUS Settings page contains the following fields:

The following fields set the RADIUS default values:

NOTE: If Host Specific Timeouts, Retransmit, Dead Time, or Deny values are not specified, the Global values are applied to each host.

Defining RADIUS Parameters:

  1. Open the RADIUS Settings page.

  2. Define the Default Timeout for Reply, Default Retries, Default Dead Time, and Default Key Strings fields.

  3. Click Apply Changes. The RADIUS settings are updated to the device.

Adding a RADIUS Server:

  1. Open the RADIUS Settings page.

  2. Click Add. The Add RADIUS Settings page opens:

Add RADIUS Server Page

  1. Define the IP Address, Priority, Authentication Port, Number of Retries, Timeout for Reply, Dead Time, Key String, and Source IP Address fields.

  2. Click Apply Changes. The new RADIUS server is added, and the device is updated.

Displaying the RADIUS Server List:

  1. Open the RADIUS Settings page.

  2. Click Show All. The RADIUS Servers List page opens.

RADIUS Servers List Page

Modifying the RADIUS Server settings:

  1. Open the RADIUS Settings page.

  2. Click Show All. The RADIUS Servers List page opens.

  3. Modify the Priority, Number of Retries, Timeout for Reply, or Dead Time fields.

  4. Click Apply Changes. The RADIUS Server settings are modified, and the device is updated.

Deleting a RADIUS Server for the RADIUS Servers List:

  1. Open the RADIUS Settings page.

  2. Click Show All. The RADIUS Servers List page opens.

  3. Select a RADIUS Server in the RADIUS Servers List .

  4. Check the Remove check box. The RADIUS server is removed from the RADIUS Servers List.

Defining RADIUS Servers Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the RADIUS Settings page.

CLI Command

Description

radius-server timeout timeout

Sets the default interval for which a device waits for a server host to reply.

radius-server retransmit retries

Specifies the default number of times the software searches the list of RADIUS server hosts.

radius-server deadtime deadtime

Configures unavailable default servers to be skipped.

radius-server key key-string

Sets the default authentication and encryption key for all RADIUS communications between the device and the RADIUS environment.

radius-server host ip-address [auth-port auth-port-number] [timeout timeout] [retransmit retries] [deadtime deadtime] [key key-string] [source source] [priority priority]

Specifies a RADIUS server host and any non-default settings.

show radius-servers

Displays the RADIUS server settings.

The following is an example of the CLI commands:

Console (config)# radius-server timeout 5

Console (config)# radius-server retransmit 5

Console (config)# radius-server deadtime 10

Console (config)# radius-server key dell-server

Console (config)# radius-server host 196.210.100.1 auth-port 1645 timeout 20

Console# show radius-servers

Port

IP address Auth Acct TimeOut Retransmit deadtime Priority

---------- ---- ---- ------- ---------- -------- --------

172.16.1.1 1645 1646 3 3 0 1

172.16.1.2 1645 1646 11 8 0 2


Defining SNMP Parameters

Simple Network Management Protocol (SNMP) provides a method for managing network devices. Devices supporting SNMP run a local software (agent).

The SNMP agents maintain a list of variables, which are used to manage the device. The variables are defined in the Management Information Base (MIB). The MIB presents the variables controlled by the agent. The SNMP protocol defines the MIB specification format as well as the format used to access the information over the network.

Access rights to the SNMP agents are controlled by access strings. To communicate with the device, the Embedded Web Server submits a valid community string for authentication. To open the SNMP page:

SNMP Page

This section contains information for managing the SNMP configuration, and includes the following topics:

Defining Communities

The system administrator manages access rights (read and write, read only, and so on.) by defining communities in the Community Table. When the community names are changed, access rights are also changed. To open the SNMP Community page:

SNMP Community Page

The SNMP Community page contains the following fields:

Defining a new community:

  1. Open the SNMP Community page.

  2. Click Add. The Add SNMP Community page opens.

Add SNMP Community Page

In addition to the fields in the SNMP Community page, the Add SNMP Community page contains the following fields:

  1. Define the SNMP Management, Management Station, Community String, and Access Mode fields.

  2. Click Apply Changes. The new community is saved, and the device is updated.

Displaying all Communities

  1. Open the SNMP Community page.

  2. Click Show All. The Community Table page opens.

Community Table Page

Deleting Communities:

  1. Open the SNMP Community page.

  2. Click Show All. The Community Table page opens.

  3. Select a community from the Community Table.

  4. Check the Remove check box.

  5. Click Apply Changes. The community entry is deleted, and the device is updated.

Configuring Communities Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the SNMP Community page.

CLI Command

Description

snmp-server community string [ro | rw | su] [ip-address]

Sets up the community access string to permit access to SNMP protocol.

show snmp

Checks the status of SNMP communications.

The following is an example of the CLI commands:

Console (config)# snmp-server community public su 0.0.0.0

Defining Traps

From the SNMP Trap Settings page, the user can enable or disable the device to send SNMP traps or notifications. To open the SNMP Trap Settings page:

SNMP Trap Settings Page

The SNMP Trap Settings page contains the following fields:

Enabling SNMP Traps on the device:

  1. Open the SNMP Trap Settings page.

  2. Select Enable in the SNMP Trap drop-down list.

  3. Define the Select Recipient IP, Traps, and Community String fields.

  4. Click Apply Changes. SNMP traps are enabled on the device.

Enabling Authentication Traps on the device:

  1. Open the SNMP Trap Settings page.

  2. Select Enable in the Authentication Trap drop-down list.

  3. Define the Select Recipient IP, Traps, and Community String fields.

  4. Click Apply Changes. Authentication traps are enabled on the device.

Adding a new Trap Recipient:

  1. Open the SNMP Trap Settings page.

  2. Click Add. The Add Trap Receiver/Manager page opens.

Add Trap Receiver/Manager Page

  1. Define the Recipient IP Address, Community String, and Trap Enable fields. (Note that 0.0.0.0 means "All", and the traps are broadcast.)

  2. Click Apply Changes. the Trap Recipient/Manager is added, and the device is updated.

Displaying the Trap Managers Table:

The Trap Managers Table contains fields for configuring trap types.

  1. Open the Traps page.

  2. Click Show All. The Traps Manager Table page opens.

Trap Managers Table Page

Deleting a Trap Manager Table entry:

  1. Open the SNMP Trap Settings page.

  2. Click Show All. The Traps Manager Table page opens.

  3. Select a Trap Managers Table entry.

  4. Check the Remove check box.

  5. Click Apply Changes. The trap manager is deleted, and the device is updated.

Configuring Traps Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the SNMP Trap Settings page.

CLI Command

Description

snmp-server enable traps

Enables the switch to send SNMP traps or SNMP notifications.

snmp-server trap authentication

Enables the switch to send SNMP traps when authentication failed.

snmp-server host host-addr community-string [1 | 2]

Determines the trap type sent to the selected recipient.

show snmp

Displays the SNMP communications status.

The following is an example of the CLI commands:

Console (config)# snmp-server enable traps

Console (config)# snmp-server trap authentication

Console (config)# snmp-server host 10.1.1.1 trapRec 2

Console (config)# exit

Console# show snmp

Community-String Community-Access IP address

---------------- ---------------- -----------

public read only All

private read write 172.16.1.1

private read write 172.17.1.1

Traps are enabled.

Authentication trap is enabled.

Trap-Rec-Address Trap-Rec-Community Version

---------------- ------------------ --------

192.122.173.42 public 2

System Contact: Robert

System Location: Marketing


Managing Files

The File Management page device allows network managers to manage device software, the Image Files, and the Configuration Files. Files can be downloaded from a TFTP server.

File Management Overview

The configuration file structure consists of the following files:

NOTE: Configuration commands are merged with the Running Configuration file and are immediately applied to the device.

To open the File Management page:

File Management Page

The File Management page contains links to:

Downloading Files

The File Download from Server page contains fields for downloading image and Configuration Files from the TFTP server to the device. To open the File Download from Server page:

File Download From Server Page

The File Download from Server page contains the following fields:

Downloading files:

  1. Open the File Download from Server page.

  2. Define the file type to download.

  3. Define the TFTP Server IP Address, Source File Name, and Destination File fields.

  4. Click Apply Changes. The software is downloaded to the device.

NOTE: To activate the selected Image file, reset the device. For information on resetting the device, see "Resetting the Device".

Downloading Files Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the File Download from Server page.

CLI Command

Description

copy source-url destination-url [snmp]

Copies any file from a source to a destination.

The following is an example of the CLI commands:

console# copy running-config tftp://11.1.1.2/pp.txt

NOTE: Each ! indicates that ten packets were successfully transferred.

Accessing file 'file1' on 172.16.101.101.

Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!! [OK]

Copy took 0:01:11 [hh:mm:ss]

Uploading Files

The File Upload to Server page contains fields for uploading the software from the TFTP server to the device. The Image file can also be uploaded from the File Upload to Server page. To open the File Upload to Server page:

File Upload to Server Page

The File Upload to Server page contains the following fields:

Uploading files:

  1. Open the File Upload to Server page.

  2. Define the file type to upload.

  3. Define the TFTP Server IP Address, Destination, and Transfer file name fields.

  4. Click Apply Changes. The software is uploaded to the device.

Uploading Files Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the File Upload to Server page.

CLI Command

Description

copy source-url destination-url [snmp]

Copies any file from a source to a destination.

The following is an example of the CLI commands:

-----------------------------------------------------

console# copy tftp://16.1.1.200/file1 image

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!2883576 bytes copied in 00:00:10 [hh:mm:ss]

Resetting the Active Image

The Active Images page allows network managers to select and reset the Image files. The Active Image file for each unit in a stacking configuration can be individually selected. To open the Active Images page:

Active Images Page

The Active Images page contains the following fields:

Selecting an Image File:

  1. Open the Active Images page.

  2. Select an Image file for a specific unit in the After Reset field.

  3. Click Apply Changes. The Image file is selected. The Image file reloads only after the next reset. The currently selected Image file continue to run until the next device reset. For instruction on resetting the device, see "Resetting the Device".

Working with the Active Image File Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Active Images page.

CLI Command

Description

boot system [unit | unit ] {image-1 | image-2}

Specifies the system image that the device loads at startup.

The following is an example of the CLI commands:

Console# boot system image-1

Copying and Deleting Files

Files can be copied and deleted from the Copy Files page. To open the Copy Files page:

Copy Files Page

The Copy Files page contains the following fields:

Copying Files:

  1. Open the Copy Files page.

  2. Select either the Copy Configuration or Copy Master Firmware field.

  3. Define the Source and Destination fields for the file.

  4. Click Apply Changes. The file is copied, and the device is updated.

Restoring Company Factory Default Settings:

  1. Open the Copy Files page.

  2. Select the Restore Company Factory Defaults fields.

  3. Click Apply Changes. The company factory default settings are restored, and the device is updated.

Copying and Deleting Files Using CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the Copy Files page.

CLI Command

Description

delete startup-config

Deletes the startup-config file.

copy source-url destination-url [snmp]

Copies any file from a source to a destination

The following is an example of the CLI commands:

Console# delete startup-config

This command will reset the whole system and disconnect your Telnet session. Do you want to continue (y/n) [n]?

Console # copy tftp://172.16.101.101/file1 image

Accessing file 'file1' on 172.16.101.101.

Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!! [OK]

Copy took 0:01:11 [hh:mm:ss]


Defining Advanced Settings

Device Tuning is used to determine the maximum amount of entries allowed in the various tables listed. Changes are implemented only after the device is reset. To open the Tuning page:

Tuning Page

The Tuning page contains the following link:

Configuring General Device Tuning Parameters

The General Settings page allows network managers to define general device parameters. To open the General Settings page:

General Settings Page

The General Settings page contains the following columns:

The General Tuning page contains the following fields:

NOTE: The maximum number of GVRP VLANs includes all the VLANs participating in GVRP operation, whether they are static or dynamic VLANs.

Viewing RAM Log Entries Counter Using the CLI Commands

The following table summarizes the equivalent CLI commands for viewing fields displayed in the General Settings page.

CLI Command

Description

logging buffered size number

Sets the number of syslog messages stored in the internal buffer (RAM).

gvrp max vlan

Configures the maximum number of VLANs when GVRP is enabled.

The following is an example of the CLI commands:

Console (config)# logging buffered size 300


Back to Contents Page