Administrator Guide

Congure the following optional and required parameters:
username: enter a text string.
encryption-type: enter 0 for plain text or 7 for encrypted text.
password: enter a text string.
NOTE: You cannot use the change directory (cd) command until you have congured ftp-server topdir.
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode.
Conguring FTP Client Parameters
To congure FTP client parameters, use the following commands.
Enter the following keywords and slot/port or number information:
For a Gigabit Ethernet interface, enter the GigabitEthernet keyword then the slot/port information.
For a loopback interface, enter the loopback keyword then a number between 0 and 16383.
For a port channel interface, enter the port-channel keyword then a number from 1 to 255 for TeraScale and ExaScale.
For a 10-Gigabit Ethernet interface, enter the TenGigabitEthernet keyword then the slot/port information.
For a VLAN interface, enter the vlan keyword then a number from 1 to 4094.
For a 40-Gigabit Ethernet interface, enter the fortyGigE keyword then the slot/port information.
CONFIGURATION mode
ip ftp source-interface interface
Congure a password.
CONFIGURATION mode
ip ftp password password
Enter a username to use on the FTP client.
CONFIGURATION mode
ip ftp username name
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode, as shown in the example for
Enabling the FTP Server.
Terminal Lines
You can access the system remotely and restrict access to the system by creating user proles.
Terminal lines on the system provide dierent means of accessing the system. The console line (console) connects you through the console
port in the route processor modules (RPMs). The virtual terminal lines (VTYs) connect you through a remote session to the system. The
auxiliary line (aux) connects secondary devices such as modems.
Denying and Permitting Access to a Terminal Line
Dell Networking recommends applying only standard access control lists (ACLs) to deny and permit access to VTY lines.
Layer 3 ACLs deny all trac that is not explicitly permitted, but in the case of VTY lines, an ACL with no rules does not deny trac.
You cannot use the show ip accounting access-list command to display the contents of an ACL that is applied only to a
VTY line.
To apply an IP ACL to a line, use the following command.
Switch Management
79