Dell PCM8024 Laptop User Manual


  Open as PDF
of 1682
 
176 Using the CLI
SSH Public Key-string
— Contains commands to manually specify the
SSH Public-key of a remote SSH Client. The SSH Public-Key Chain
Configuration mode command
user-key
command is used to enter the
SSH Public-Key Configuration mode
.
MAC Access-List
— Configures conditions required to allow traffic based
on MAC addresses. The Global Configuration mode command
mac-
access-list
is used to enter the MAC Access-List configuration mode.
TACACS
— Configures the parameters for the TACACS server.
Radius
— Configures the parameters for the RADIUS server.
SNMP Host Configuration
— Configures the parameters for the SNMP
server host.
Crypto Certificate Request
— Configures the parameters for crypto
certificate request.
Crypto Certificate Generation
— Configures the parameters for crypto
certificate generate.
Logging
— Configures the parameters for syslog log server.
Datacenter-Bridging
— Contains priority-flow-control commands. The
datacenter-bridging command for an ethernt or port-channel interface is
used to enter the DataCenterBridging mode.
Identifying the Switch and Command Mode from the System Prompt
The system prompt provides the user with the name of the switch
(hostname) and identifies the command mode. The following is a formal
description of the system command prompt:
[
device name
][([
command mode-
[
object
]])][# | >]
[
device name
] — is the name of the managed switch, which is typically the
user-configured hostname established by the hostname command.
[
command mode
] — is the current configuration mode and is omitted for the
top configuration levels.
[
object
] — indicates specific object or range of objects within the
configuration mode.
For example, if the current configuration mode is config-if and the object
being operated on is gigabit ethernet 1 on unit 1, the prompt displays the
object type and unit (for example, 1/0/1).
2CSPC4.XModular-SWUM200.book Page 176 Thursday, March 10, 2011 11:18 AM