Dell Networking 2024 Reference Manual page 194

Hide thumbs Also See for Networking 2024:
Table of Contents

Advertisement

SSH Public Key-chain — Contains commands to manually specify other
switch SSH public keys. The Global Configuration mode command crypto
key pub-key chain ssh is used to enter the SSH Public Key-chain
configuration mode.
SSH Public Key-string — Contains commands to manually specify the
SSH Public-key of a remote SSH Client. The SSH Public-Key Chain
Configuration mode command user-key command is used to enter the
SSH Public-Key Configuration mode.
MAC Access-List — Configures conditions required to allow traffic based
on MAC addresses. The Global Configuration mode command mac-
access-list is used to enter the MAC Access-List configuration mode.
TACACS — Configures the parameters for the TACACS server.
Radius — Configures the parameters for the RADIUS server.
SNMP Host Configuration — Configures the parameters for the SNMP
server host.
Crypto Certificate Request — Configures the parameters for crypto
certificate request.
Crypto Certificate Generation — Configures the parameters for crypto
certificate generate.
Logging — Configures the parameters for syslog log server.
Identifying the Switch and Command Mode from the System Prompt
The system prompt provides the user with the name of the switch
(hostname) and identifies the command mode. The following is a formal
description of the system command prompt:
device name
[
][([
device name
[
] — is the name of the managed switch, which is typically the
user-configured hostname established by the hostname command.
command mode
[
top configuration levels.
object
[
] — indicates specific object or range of objects within the
configuration mode.
command mode-
] — is the current configuration mode and is omitted for the
object
[
]])][# | >]
Using the CLI
194

Advertisement

Table of Contents
loading

Table of Contents