Concept Guide
– username: enter a text string.
– encryption-type: enter 0 for plain text or 7 for encrypted text.
– password: enter a text string.
NOTE: You cannot use the change directory (cd) command until you have congured ftp-server topdir.
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode.
Conguring FTP Client Parameters
To congure FTP client parameters, use the following commands.
• Enter the following keywords and slot/port or number information:
– For a Loopback interface, enter the keyword loopback then a number between 0 and 16383.
– For a port channel interface, enter the keywords port-channel then a number from 1 to 128.
– For a 10-Gigabit Ethernet interface, enter the keyword TenGigabitEthernet then the slot/port information.
– For a VLAN interface, enter the keyword vlan then a number from 1 to 4094.
CONFIGURATION mode
ip ftp source-interface interface
• Congure a password.
CONFIGURATION mode
ip ftp password password
• Enter a username to use on the FTP client.
CONFIGURATION mode
ip ftp username name
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode, as shown in the example for
Enabling the FTP Server.
Terminal Lines
You can access the system remotely and restrict access to the system by creating user proles.
Terminal lines on the system provide dierent means of accessing the system. The virtual terminal lines (VTYs) connect you through Telnet
to the system.
Denying and Permitting Access to a Terminal Line
Dell Networking recommends applying only standard access control lists (ACLs) to deny and permit access to VTY lines.
• Layer 3 ACLs deny all trac that is not explicitly permitted, but in the case of VTY lines, an ACL with no rules does not deny trac.
• You cannot use the show ip accounting access-list command to display the contents of an ACL that is applied only to a
VTY line.
• When you use the access-class access-list-name command without specifying the ipv4 or ipv6 attribute, both IPv4 as
well as IPv6 rules that are dened in that ACL are applied to the terminal. This is a generic way of conguring access restrictions.
• To be able to lter access exclusively using either IPv4 or IPv6 rules, you must use either the ipv4 or ipv6 attribute along with the
access-class access-list-name command. Depending on the attribute that you specify (ipv4 or ipv6), the ACL processes
either IPv4 or IPv6 rules, but not both. Using this conguration, you can set up two dierent types of access classes with each class
processing either IPv4 or IPv6 rules separately.
82
Management