Concept Guide

username: enter a text string.
encryption-type: enter 0 for plain text or 7 for encrypted text.
password: enter a text string.
NOTE: You cannot use the change directory (cd) command until you have congured ftp-server topdir.
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode.
Conguring FTP Client Parameters
To congure FTP client parameters, use the following commands.
Enter the following keywords and slot/port or number information:
For a Loopback interface, enter the keyword loopback then a number between 0 and 16383.
For a port channel interface, enter the keywords port-channel then a number from 1 to 128.
For a 10-Gigabit Ethernet interface, enter the keyword TenGigabitEthernet then the slot/port information.
For a VLAN interface, enter the keyword vlan then a number from 1 to 4094.
CONFIGURATION mode
ip ftp source-interface interface
Congure a password.
CONFIGURATION mode
ip ftp password password
Enter a username to use on the FTP client.
CONFIGURATION mode
ip ftp username name
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode, as shown in the example for
Enabling the FTP Server.
Terminal Lines
You can access the system remotely and restrict access to the system by creating user proles.
Terminal lines on the system provide dierent means of accessing the system. The virtual terminal lines (VTYs) connect you through Telnet
to the system.
Denying and Permitting Access to a Terminal Line
Dell Networking recommends applying only standard access control lists (ACLs) to deny and permit access to VTY lines.
Layer 3 ACLs deny all trac that is not explicitly permitted, but in the case of VTY lines, an ACL with no rules does not deny trac.
You cannot use the show ip accounting access-list command to display the contents of an ACL that is applied only to a
VTY line.
When you use the access-class access-list-name command without specifying the ipv4 or ipv6 attribute, both IPv4 as
well as IPv6 rules that are dened in that ACL are applied to the terminal. This is a generic way of conguring access restrictions.
To be able to lter access exclusively using either IPv4 or IPv6 rules, you must use either the ipv4 or ipv6 attribute along with the
access-class access-list-name command. Depending on the attribute that you specify (ipv4 or ipv6), the ACL processes
either IPv4 or IPv6 rules, but not both. Using this conguration, you can set up two dierent types of access classes with each class
processing either IPv4 or IPv6 rules separately.
82
Management