Dell 3424P Computer Accessories User Manual


 
156 Configuring System Information
www.dell.com | support.dell.com
The following is an example of the CLI command:
Managing Switch Security
The
Management Security
page provides access to security pages that contain fields for setting
security parameters for ports, device management methods, user, and server security. To open the
Management Security
page
,
click
System
Management Security
in the tree view.
Defining Access Profiles
The
Access Profiles
page contains fields for defining profiles and rules for accessing the device.
Access to management functions can be limited to user groups, which are defined by ingress
interfaces and source IP address or source IP subnets.
Management access can be separately defined for each type of management access method,
including Web (HTTP), Secure Web (HTTPS), Telnet, and Secure Telnet.
Access to different management methods may differ between user groups. For example, User
Group 1 can access the device only via an HTTPS session, while User Group 2 can access the device
via both HTTPS and Telnet sessions.
Management Access Lists contain up to 256 rules that determine which users can manage the
device, and by which methods. Users can also be blocked from accessing the device.
The
Access Profiles
page contains fields for configuring Management Lists and applying them to
specific interfaces. To open the
Access Profiles
page, click
System
Management Security
Access
Profiles
in the tree view.
Console# show fiber-ports optical-transceiver detailed
Port Temp
[C]
Voltage Current
[Volt]
Output
[mA]
Input
[mWatt]
POWER
TX
[mWatt]
LOS
Fault
---- ---- ------ ----- ------ ------ ------ -----
1/e1 48 5.15 50 1.789 1.789 No No
1/e2 43 5.15 10 1.789 1.789 No No