Dell PowerConnect 3548 Command Line Interface Guide - Page 65
Enables Internet Group Management Protocol IGMP snooping., Creates Layer 2 ACLs. - console commands
View all Dell PowerConnect 3548 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 65 highlights
ip http authentication ip http exec-timeout ip http port ip http server ip https authentication ip https certificate ip https exec-timeout ip https port ip https server ip igmp snooping (Global) ip name-server ip ssh port ip ssh pubkey-auth ip ssh server lacp system-priority line logging logging buffered logging buffered size logging console logging file logging on mac access-list management access-class management access-list management logging password min-length Specifies authentication methods for HTTP server users. Enables the device to be configured from a secured browser. Specifies the TCP port for use by a web browser to configure the device. Enables the device to be configured from a browser. Specifies authentication methods for HTTPS server users. Configures the active certificate for HTTPS. Sets the interval the system waits for user input before automatically logging off. Configures a TCP port for use by a secure web browser to configure the device. Enables configuring the device from a secured browser. Enables Internet Group Management Protocol (IGMP) snooping. Sets the available name servers. Specifies the port to be used by the SSH server. Enables public key authentication for incoming SSH sessions. Enables the device to be configured from a SSH server. Configures the system LACP priority. Identifies a specific line for configuration and enters the line configuration command mode. Logs messages to a syslog server. Limits syslog messages displayed from an internal buffer based on severity. Changes the number of syslog messages stored in the internal buffer. Limits messages logged to the console based on severity. Limits syslog messages sent to the logging file based on severity. Controls error messages logging. Creates Layer 2 ACLs. Defines which management access-list is used. Defines a management access-list, and enters the access-list for configuration. Enables logging management access list events. Sets the minimum required length for passwords in the local database. Command Modes 65