Users Guide

Dell#
Dell# show dot1x interface fortyGigE 1/48
802.1x information on Fo 1/48:
-----------------------------
Dot1x Status: Enable
Port Control: FORCE_AUTHORIZED
Port Auth Status: UNAUTHORIZED
Re-Authentication: Disable
Untagged VLAN id: None
Guest VLAN: Disable
Guest VLAN id: NONE
Auth-Fail VLAN: Disable
Auth-Fail VLAN id: NONE
Auth-Fail Max-Attempts: NONE
Mac-Auth-Bypass: Disable
Mac-Auth-Bypass Only: Disable
Tx Period: 30 seconds
Quiet Period: 60 seconds
ReAuth Max: 2
Supplicant Timeout: 30 seconds
Server Timeout: 30 seconds
Re-Auth Interval: 3600 seconds
Max-EAP-Req: 2
Host Mode: SINGLE_HOST
Auth PAE State: Initialize
Backend State: Initialize
Dell#
SSH and SCP Commands
Dell Networking OS supports secure shell (SSH) protocol versions 1.5 and 2.0. SSH is a protocol for secure
remote login over an insecure network. SSH sessions are encrypted and use authentication.
crypto key generate
Generate keys for the SSH server.
Syntax
NOTE: Some of the parameters in this command require licensing to access. For
more information, contact your Dell Networking representative.
crypto key generate {rsa | rsa1}
Parameters
rsa Enter the keyword rsa then the key size to generate a SSHv2
RSA host keys. The range is from 1024 to 2048 if you did not
enable FIPS mode; if you enabled FIPS mode, you can only
generate a 2048-bit key. The default is 1024.
Security 1784