Dell Networking 2024 Reference Manual page 209

Hide thumbs Also See for Networking 2024:
Table of Contents

Advertisement

The security log record contains the following information:
The user name, if available, or the protocol being accessed if the event is
related to a remote management system.
The IP address from which the user is connecting or the IP address of the
remote management system.
A description of the security event.
A timestamp of the event
If syslog is available, the CLI sends security records to the syslog server.
Management ACL
In addition to user access control, the system also supports filtering of
management protocols packets addressed to the switch.. The system allows
individual hosts or subnets to access the switch using specific management
protocols.
The user defines a management profile, which identifies management
protocols such as the following:
Telnet.
SSH and the keying information to use for SSH.
HTTP.
HTTPS and the security certificate to be used.
SNMPv1/v2c and the read and read/write community strings to be used.
SNMPv3 and the security information for used this protocol.
For each of these management profiles, the user defines the list of hosts or
subnets from which the management profiles may be used.
Other CLI Tools and Capabilities
The CLI has several other capabilities associated with its primary functions.
Terminal Paging
The terminal width and length for CLI displays is 79 characters and 25 lines,
respectively. The length setting is used to control the number of lines the CLI
will display before it pauses. For example, the CLI pauses at 24 lines and
prompts the user with the
-more-
prompt on the 25th line. The CLI waits for
Using the CLI
209

Advertisement

Table of Contents
loading

Table of Contents