The DGS-3420 Layer 2+ stackable Gigabit Ethernet switch series are members of the D-Link
xStack® family. Ranging from 10/100/1000Mbps edge switches to core gigabit switches, the
xStack
tolerance, flexibility, port density, robust security and maximum throughput with a user-friendly
management interface for the networking professional.
The Switch can be managed through the Switch’s serial port, Telnet, SNMP or the Web-based
management agent. The Command Line Interface (CLI) can be used to configure and manage the
Switch via the serial port or Telnet interfaces.
This manual provides a reference for all of the commands contained in the CLI. Every command
will be introduced in terms of purpose, format, description, parameters, and examples.
Configuration and management of the Switch via the Web-based management agent are
discussed in the Web UI Reference Guide. For detailed information on installi ng h ardware please
also refer to the Harware Installation Guide.
®
switch family has been future-proof designed to provide a stacking architecture with fault
1-1 Accessing the Switch via the Ser ial Port
The Switch’s serial port’s default settings are as follows:
• 115200 baud
• no parity
• 8 data bits
• 1 stop bit
A computer running a terminal emulation program capable of emulating a VT-100 terminal and a
serial port configured as above is then connected to the Switch’s serial port via an RJ-45 to RS232 DB-9 convertor cable.
With the serial port properly connected to a management computer, the following screen should be
visible.
DGS-3420-28SC Gigabit Ethernet Switch
Command Line Interface
Firmware: Build 1.00.024
Copyright(C) 2011 D-Link Corporation. All rights reserved.
UserName:
There is no initial username or password. Just press the Enter key twice to display the CLI input
cursor − DGS-3420-28SC:admin#. This is the command line where all commands are input.
DGS-3420-28SC:admin# config ipif System ipaddress 10.24.22.100/255.0.0.0
DGS-3420-28SC:admin#
1-2 Setting the Switch’s IP Address
Each Switch must be assigned its own IP Address, which is used for communication with an
SNMP network manager or other TCP/IP application (for example BOOTP, TFTP). The Switch’s
default IP address is 10.90.90.90. You can change the default Switch IP address to meet the
specification of your networking address scheme.
The Switch is also assigned a unique MAC address by the factory. This MAC address cannot be
changed, and can be found on the initial boot console screen – shown below.
The Switch’s MAC address can also be found in the Web management program on the Device
Information (Basic Settings) window on the Configuration menu.
The IP address for the S wit c h must be set before it ca n be managed with the Web-based manager.
The Switch IP address can be automatically set using BOOTP or DHCP protocols, in which case
the actual address assigned to the Switch must be known.
Starting at the command line prompt, enter the commands config ipif System ipaddress xxx.xxx.xxx.xxx/yyy.yyy.yyy.yyy. Where the x’s represent the IP address to be assigned to the
IP interface named System and the y’s represent the corresponding subnet mask.
Alternatively, you can enter config ipif System ipaddress xxx.xxx.xxx.xxx/z. Where the x’s
represent the IP address to be assigned to the IP interface named System a nd th e z represents
the corresponding number of subnets in CIDR notation.
The IP interface named System on the Switch can be assigned an IP address and subnet mask
which can then be used to connect a management station to the Switch’s Telnet or Web-based
management agent.
Command: config ipif System ipaddress 10.24.22.100/8
In the above example, the Switch was assigned an IP address of 10.24.22.100 with a subnet mask
of 255.0.0.0. The system message Success indicates that the command was executed
successfully. The Switch can now be configured and managed via Telnet, SNMP MIB browser and
the CLI or via the Web-based management agent using the above IP address to connect to the
Switch.
There are a number of helpful features included in the CLI. Entering the ? c om mand will display a
list of all of the top-level commands.
CTRL+CESCq Quit SPACEn Next Page ENTER Next Entry a All
When entering a command without its required parameters, the CLI will prompt you with a Next
possible completions: message.
Command: config account
Next possible completions:
<username>
In this case, the command config account was entered with the parameter <username>. The CLI
will then prompt to enter the <username> with the message, Next possible completions:. Every
command in the CLI has this feature, and complex commands have several layers of parameter
prompting.
In addition, after typing any given command plus one space, users can see all of the next possible
sub-commands, in sequential order, by repeatedly pressing the Tab key.
To re-enter the previous command at the command prompt, press the up arrow cursor key. The
previous command will appear at the command prompt.
Command: config account
Next possible completions:
<username>
In the above example, the command config account was entered without the required parameter
<username>, the CLI returned the Next possible completions: <username> prompt. The up
arrow cursor control key was pressed to re-enter the previous command (config account) at the
command prompt. Now the appropriate username can be entered and the config account
command re-executed.
All commands in the CLI function in this way. In addition, the syntax of the help prompts are the
same as presented in this manual − angle brackets < > indicate a numerical value or character
string, braces { } indicate optional parameters or a choice of parameters, and brackets [ ] indicate
required parameters.
If a command is entered that is unrecognized by the CLI, the top-level commands will be displayed
under the Available commands: prompt.
Available commands:
.. ? cable_diag cd
cfm change clear config
copy create debug del
delete dir disable download
enable erase format login
logout md move no
ping ping6 rd reboot
reconfig rename reset save
show smtp telnet traceroute
traceroute6 upload
DGS-3420-28SC:admin#
The top-level commands consist of commands such as show or config. Most of these commands
require one or more param eter s to narr o w the top-level command. T his is equival ent to show what?
or config what? Where the what? is the next parameter.
For example, entering the show command with no additional parameters, the CLI will then display
all of the possible next parameters.
Encloses a variable or value. Users must specify the variable or value.
square brackets [ ]
Encloses a required value or list of required arguments. Only one
vertical bar |
Separates mutually exclusive items in a list. For example, in the syntax
parentheses ( )
Indicates at least one or more of the values or arguments in the
In the above example, all of the possible next parameters for the show command are displayed. At
the next command prompt, the up arrow was used to re-enter the show command, followed by the
account parameter. The CLI then displays the user accounts configured on the Switch.
1-3 Command Syntax Symbols
The following symbols are used to describe how command entries are made and values and
arguments are specified in this manual. The online help contained in the CLI and available through
the console interface uses the same syntax.
Note: All commands are case-sensitive. Be sure to disable Caps Lock or any other unwanted
function that changes text case.
users must supply an IP interface name for <ipif_name 12> and a
VLAN name for <vlan_name 32> when entering the command. DO
NOT TYPE THE ANGLE BRACKETS.
value or argument must be specified. For example, in the syntax
users must specify either the admin-, operator-, power_user-level or
user-level account when entering the command. DO NOT TYPE THE
SQUARE BRACKETS.
reset {[config |system]} {force_agree}
users may choose config or system in the command. DO NOT TYPE
THE VERTICAL BAR.
braces { } Encloses an optional value or a list of optional arguments. One or
more values or arguments can be specified. For example, in the syntax
reset {[config | system]} {force_agree}
users may choose config or system in the command. DO NOT TYPE
THE BRACES.
preceding syntax enclosed by braces must be specified. For example,
in the syntax
config dhcp_relay {hops <int 1-16> | time <sec 0-65535>}(1)
users have the option to specify hops or time or both of them. The "(1)"
following the set of braces indicates at least one argument or value
within the braces must be specified. DO NOT TYPE THE
PARENTHESES.
12 means the maximum length of the IP interface name.
Keys
Description
Backspace
Delete character to left of cursor and shift remainder of line to left.
CTRL+R
Toggle on and off. When toggled on, inserts text and shifts previous
Up Arrow
Repeats the previously entered command. Each time the up arrow is
Left Arrow
Move cursor to left.
Tab
Help user to select appropriate token.
Keys
Description
CTRL+C
Stops the display of remaining pages when multiple pages are to be
ESC
Stops the display of remaining pages when multiple pages are to be
n
Displays the next page.
p
Displays the previous page.
a
Displays the remaining pages without pausing between pages.
Enter
Displays the next line or table entry.
metric <value 1-31>
1-31 means the legal range of the metric value.
1-4 Line Editing Keys
Delete Delete character under cursor and shift remainder of line to left.
text to right.
pressed, the command previous to that displayed appears. This way it is
possible to review the command history for the current session. Use the
down arrow to progress sequentially forward through the command
history list.
Down Arrow The down arrow will display the next command in the command history
entered in the current session. This displays each command sequentially
as it was entered. Use the up arrow to review previous commands.
Right Arrow Move cursor to right
The screen display pauses when the show command output reaches the end of the page.
1-5 Multiple Page Display Control Keys
Space Displays the next page.
displayed.
displayed.
q Stops the display of remaining pages when multiple pages are to be
config account <username>{encrypt [plain_t ex t | sha_1] <pas sw ord>}
show account
delete account <username>
show session
show switch
show environment
config temperature [trap | log] state [enable | disable]
config temperature threshold {high <temperature -500-500> | low <temperature -500-500>}(1)
show serial_port
config serial_port { bau d_r at e [960 0 | 19200 | 38400 | 1152 00] | auto_l ogo ut [never | 2_minutes |
5_minutes | 10_minutes | 15_m inutes ]}( 1)
enable clipaging
disable clipaging
enable telnet {<tcp_port_number 1-65535>}
disable telnet
enable web {<tcp_port_number 1-65535>}
disable web
save {[config <pathname> | log | all]}
reboot {force_agree}
reset {[config | system]} {force_agree}
login
logout
clear
config terminal width [default | <value 80-200>]
show terminal width
show device_status
admin - Specify the name of the admin account.
Chapter 2 Basic Management
Commands
2-1 create account
Description
This command creates user accounts. The username is between 1 and 15 characters, the
password is between 0 and 15 characters. The number of accounts (including admin, operator,
power-user and user) is up to eight.
plain_text - Specify the password in plain text form.
sha_1 - Specify the password in SHA-1 encrypted form.
<password> - The password for the user account. The length of a password in plain-text form
and encrypted form are different. For a plain-text form password, the password must be a
minimum of 0 characters and a maximum of 15 characters. For an encrypted form
Restrictions
Only Administrator-level users can issue this command.
Example
To create the Administrator-level user “dlink”:
Command: create account admin dlink
Enter a case-sensitive new password:****
Enter the new password again for confirmation:****
Success.
DGS-3420-28SC:admin#
To create the Operator-level user “Sales”:
Command: create account operator Sales
Enter a case-sensitive new password:****
Enter the new password again for confirmation:****
Success.
DGS-3420-28SC:admin#
To create the User-lev el us er “System”:
Command: create account user System
Enter a case-sensitive new password:****
Enter the new password again for confirmation:****
Success.
The user account configuration information will be stored in the configuration file, and can be
applied to the system later. If the password encryption is enabled, the password will be in
encrypted form when it is stored in the configuration file. When password encryption is disabled,
the password will be in plain text form when it is stored in the configuration file. However, if the
created user account directly uses the encrypted password, the password will still be in the
encrypted form.
Format
enable password encryption
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable password encryption:
Command: enable password encryption
Success.
DGS-3420-28SC:admin#
2-3disable password encryption
Description
The user account configuration information will be stored in the configuration file, and can be
applied to the system later. If the password encryption is enabled, the password will be in
encrypted form when it is stored in the configuration file. When password encryption is disabled,
the password will be in plain text form when it is stored in the configuration file. However, if the
created user account directly uses the encrypted password, the password will still be in the
encrypted form.
<username> - Specify the name of the account. The account must already be defined.
encrypt - (Optional) Spec if y the enc r yption t ype, plain_text or sha_1.
the length is fixed to 35 bytes long. The password is case-sensitive.
<password> - Specify the password.
DGS-3420-28SC:admin#config account dlink
Enter the new password again for confirmation:****
Restrictions
Only Administrator-level users can issue this command.
Example
To disable password encryption:
Command: disable password encryption
Success.
2-4config account
Description
When the password information is not specified in the command, the system will prompt the user
to input the password interactively. For this case, the user can only input the plain text password.
If the password is present in the command, the user can select to input the password in the plain
text form or in the encrypted form. The encryption algorithm is based on SHA-1.
SNMP : Disabled
SSL Status : Disabled
SSH Status : Disabled
802.1X : Disabled
Jumbo Frame : Off
CLI Paging : Enabled
MAC Notification : Disabled
Port Mirror : Disabled
SNTP : Disabled
HOL Prevention State : Enabled
Syslog Global State : Disabled
Single IP Management : Disabled
Password Encryption Status : Disabled
DNS Resolver : Disabled
2-9show environment
Description
This command is used to display the device’s internal and external po wer and inter nal temperature
status.
Format
show environment
Parameters
None.
Restrictions
None.
Example
To display the switch hardware status:
Command: show environment
Internal Power : Active
External Power : Fail
Right Fan 1 : Speed Low (3000 RPM)
Right Fan 2 : Speed Low (3000 RPM)
Current Temperature(Celsius) : 30
Fan High Temperature Threshold(Celsius) : 40
Fan Low Temperature Threshold(Celsius) : 35
high - Specify the high threshold value. The high threshold must bigger than the low threshold.
and 500.
low - Specify the low threshold value.
DGS-3420-28SC:admin#config temperature threshold high 80
DGS-3420-28SC:admin#
2-11config temperature threshold
Description
This command is used to configure the warning temperature high threshold or low threshold. When
temperature is above the high threshold or below the low threshold, SW will send alarm traps or
keep the logs.
Format
config temperature threshold {high <temperature -500-500> | low <temp erat ure -500-500>}(1)
Parameters
<temperature -500-500> - Specify the high threshold value. This value must be between -500
<temperature -500-500> - Specify the low threshold value. This value must be between -500
and 500.
Restrictions
Only Administrator and Operator-level users can issue this command.
Example
To configure a warming temperature threshold high of 80:
Command: config temperature threshold high 80
Success.
2-12show serial_port
Description
This command is used to display the current console port setting.
Baud Rate : 115200
Data Bits : 8
Parity Bits : None
Stop Bits : 1
Auto-Logout : 10 mins
DGS-3420-28SC:admin#
2-13config serial_port
Description
This command is used to configure the serial bit rate that will be used to communicate with the
management host and the auto logout time for idle connections.
9600 - Specify a baud rate of 9600.
19200 - Specify a baud rate of 19200.
38400 - Specify a baud rate of 38400.
never - Specify to never timeout.
2_minutes - Specify when the idle value is over 2 minutes, the device will auto logout.
5_minutes - Specify when the idle value over 5 minutes, the device will auto logout.
10_minutes - Specify when the idle value is over 10 minutes, the device will auto logout.
Restrictions
Only Administrator and Operator-level users can issue this command.
Are you sure you want to proceed with system reset
DGS-3420-28SC:admin#
DGS-3420-28SC:admin#reset config
DGS-3420-28SC:admin#reset system
DGS-3420-28SC:admin#login
except IP address, log, user account and banner?(y/n) y
Success.
To reset the system configuration settings:
Command: reset config
Are you sure to proceed with system reset?(y/n)
Success.
DGS-3420-28SC:admin#
To reset all system parameters, save, and restart the switch:
Command: reset system
Are you sure to proceed with system reset, save and reboot?(y/n)
Loading factory default configuration… Done.
Saving all configuration to NV-RAM… Done.
Please wait, the switch is rebooting…
To display the configuration of the current terminal width:
Command: show terminal width
Global terminal width : 80
Current terminal width : 80
DGS-3420-28SC:admin#
2-28show device_status
Description
This command displays current status of power(s) and fan(s) on the system.
Within fan(s) status display, for example, there are three fans on the left of the switch, if three fans
is working normally, there will display “OK” in the Left Fan field. If some fans work failed, such as
fan 1,3 , there will only display the failed fans in the Left Fan field, such as “1,3 Fail”.
In the same way, the Right Fan, Back Fan is same to Left Fan. Because there is only one CPU
Fan, if it is working failed, display “Fail”, otherwise display “OK”.
DGS-3420-28SC:admin# show 802.1x auth_state ports 1-4
DGS-3420-28SC:admin#
DGS-3420-28SC:admin# show 802.1x auth_configuration ports 1:1
DGS-3420-28SC:admin#
Forward EAPOL PDU : Disabled
Max User : 448
RADIUS Authorization : Enabled
To display the 802.1x state for ports 1 to 5:
Command: show 802.1x auth_state ports 1-4
Status: A – Authorized; U – Unauthorized; (P): Port-Based 802.1X Pri: Priority
Port MAC Address Auth PAE State Backend Status VID Pri
VID State
----- -------------------- ------- -------------- ---------- ------ ----- ----1 00-00-00-00-00-01 10 Authenticated Idle A 4004 3
1 00-00-00-00-00-02 10 Authenticated Idle A 1234 1 00-00-00-00-00-04 30 Authenticating Response U - 2 - (P) - Authenticating Request U - 3 - (P) - Connecting Idle U - 4 - (P) - Held Fail U - -
Total Authenticating Hosts: 3
Total Authenticated Hosts : 2
To display the 802.1x configuration for port 1:
Command: show 802.1x auth_configuration ports 1:1
Port number : 1:1
Capability : None
AdminCrlDir : Both
OpenCrlDir : Both
Port Control : Auto
QuietPeriod : 60 Seconds
TxPeriod : 30 Seconds
SuppTimeout : 30 Seconds
ServerTimeout : 30 Seconds
MaxReq : 2 Times
ReAuthPeriod : 3600 Seconds
ReAuthenticate : Disabled
Forward EAPOL PDU On Port : Enabled
Max User On Port : 10
by setting the parameter of port_control to be force_authorized or force_unauthorized.
Besides, the controlled port will reflect the outcome of authentication if port_control is auto.
force_authorized - The port transmits and receives normal traffic without 802.1X-based
authentication of the client.
auto - The port begins in the unauthorized state, and relays authentication messages between
the client and the authentication server.
force_unauthorized - The port will remain in the unauthorized state, ignoring all attempts by
- (Optional) The initialization value of the quietWhile timer. The default value is 60 s
and can be any value from 0 to 65535.
can be any value from 1 to 65535.
supplicant. Its default value is 30 s and can be any value from 1 to 65535.
authentication server. Its default value is 30 and can be any value from 1 to 65535.
will retransmit an EAP Request packet to the supplicant. Its default value is 2 and can be any
number from 1 to 10.
authentication timer. The default value is 3600.
<value 1-448> - The maximum users value must be between 1 and 448.
enable - Enable the re-authentication mechanism for a specific port.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
To configure the parameters that control the operation of the authenticator associated with a port:
Command: config 802.1x auth_parameter ports 1-20 direction both
Success.
3-12config 802.1x authorization attributes radius
Description
This command is used to enable or disable the acceptation of an authorized configuration. (To
configure that attributes, regarding VLAN, 802.1p, ACL and Ingress/Egress Bandwidth, please
refer to the Appendix section at the end of this document.)
port_based ports - The switch passes data based on its authenticated port.
all - Specify to configure all ports.
mac_based ports
all - Specify to configure all ports.
mac_address - (Optional) Specify the MAC address of the authenticated RADIUS client.
<macaddr> - Enter the MAC address here.
DGS-3420-28SC:admin# config 802.1x reauth port_based ports all
DGS-3420-28SC:admin#
Command: config 802.1x max_users 2
Success.
3-15config 802.1x reauth
Description
This command is used to reauthenticate the device connected with the port. During the
reauthentication period, the port status remains authorized until failed reauthentication.
<portlist> - Specify a range of ports to be configured.
- The switch passes data based on the MAC address of authenticated
RADIUS client.
<portlist> - Specify a range of ports to be configured.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To reauthenticate the device connected with the port:
Command: config 802.1x reauth port_based ports all
Success.
3-16create 802.1x guest_vlan
Description
This command is used to assign a static VLAN to be a guest VLAN. The specific VLAN which is
assigned to a guest VLAN must already exist. The specific VLAN which is assigned to the guest
VLAN can’t be deleted.
- Specify the key pre-negotiated between switch and the RADIUS server. It is used to encrypt
user’s authentication data before being transmitted over the Internet. The maximum length of
the key is 32.
between the switch and the RADIUS server.The range is 1 to 65535.
between the switch and the RADIUS server. The range is 1 to 65535.
<udp_port_number 1-65535> - The accounting statistics value must be between 1 and
<server_ip> - Enter the RADIUS server IP address here.
encrypt user’s authentication data before being transmitted over the Internet. The maximum
length of the key is 32.
<passwd 32> - Specify the key pre-negotiated between the switch and the RADIUS server. It
is used to encrypt user’s authentication data before being transmitted over the Internet.
between the switch and the RADIUS server. The default is 1812.
<udp_port_number 1-65535> - The authentication port value must be between 1 and 65535.
between the switch and the RADIUS server. The default is 1813.
<udp_port_number 1-65535> - The accounting statistics value must be between 1 and
65535.
seconds.
<int 1-255> - Specify the time in seconds for waiting for a server reply. The timeout value
must be between 1 and 255. The default value is 5 seconds.
<int 1-20> - The re-transmit value must be between 1 and 20.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
The TACACS / XTACACS / TACACS+ / RADIUS commands allows secure access to the Switch
using the TACACS / XTACACS / TACACS+ / RADIUS protocols. When a user logs in to the
Switch or tries to access the administrator level privilege, he or she is prompted for a password. If
TACACS / XTACACS / TACACS+ / RADIUS authentication is enabled on the Switch, it will contact
a TACACS / XTACACS / TACACS+ / RADIUS server to verify the user. If the user is verified, he or
she is granted access to the Switch.
There are currently three versions of the TACACS security protocol, each a separate entity. The
Switch’s software supports the following versions of TACACS:
1. TACACS (Terminal Access Con troller Access Control System) —Provides password
checking and authentication, and notification of user actions for security purposes utilizing
Note: User granted access to the Switch will be granted normal user privileges on the
via one or more centralized TACACS servers, utilizing the UDP protocol for packet
transmission.
2. Extended TACACS (XTACACS) — An extension of the TACACS protocol with the ability
to provide more types of authentication requests and more types of response codes than
TACACS. This protocol also uses UDP to transmit packets.
3. TACACS+ (Terminal Access Controller Access Control System plus) — Provides
detailed access control for authentication for network devices. TACACS+ is facilitated
through Authentication commands via one or more centralized servers. The TACACS+
protocol encrypts all traffic between the Switch and the TACACS+ daemon, using the TCP
protocol to ensure reliable delivery.
The Switch also supports the RADIUS protocol for authentication using the Access Authentication
Control commands. RADIUS or Remote Authentication Dial In User Server also uses a remote
server for authentication and can be responsible for receiving user connection requests,
authenticating the user and returning all configuration information necessary for the client to deliver
service through the user. RADIUS may be facilitated on this Switch using the commands listed in
this section.
In order for the TACACS / XTACACS / TACACS+ / RADIUS security function to work properly, a
TACACS / XTACACS / TACACS+ / RADIUS server must be configured on a device other than the
Switch, called a server host and it must include usernames and passwords for authentication.
When the user is prompted by the Switch to enter usernames and passwords for authentication,
the Switch contacts the TACACS / XTACACS / TACACS+ / RADIUS server to verify, and the
server will respond with one of three messages:
The server verifies the username and password, and the user is granted normal user privileges on
the Switch. The server will not accept the username and password and the user is denied access
to the Switch.
The server doesn’t respond to the verification query. At this point, the Switch receives the timeout
from the server and then moves to the next method of verification configured in the method list.
The Switch has four built-in server groups, one for each of the TACACS, XTACACS, TACACS+
and RADIUS protocols. These built-in server groups are used to authenticate users trying to
access the Switch. The users will set server hosts in a preferable order in the built-in server group
and when a user tries to gain access to the Switch, the Switch will ask the first server host for
authentication. If no authentication is made, the second server host in the list will be queried, and
so on. The built-in server group can only have hosts that are running the specified protocol. For
example, the TACACS server group can only have TACACS server hosts.
The administrator for the Switch may set up five different authentication techniques per userdefined method list (TACACS / XTACACS / TACACS+ / RADIUS / local / none) for authentication.
These techniques will be listed in an order preferable, and defined by the user for normal user
authentication on the Switch, and may contain up to eight authentication techniques. When a user
attempts to access the Switch, the Switch will select the first technique listed for authentication. If
the first technique goes through its server hosts and no authentication is returned, the Switch will
then go to the next technique listed in the server group for authentication, until the authentication
has been verified or denied, or the list is exhausted.
Switch. To gain access to admin level privileges, the user must enter the enable
admin command and then enter a password, which was previously configured by
the administrator of the Switch.
Note: This Switch also support the assignment of user privilege by a TACACS+ server.
Note: TACACS, XTACACS and TACACS+ are separate entities and are not compatible.
DGS-3420-28SC:admin#enable authen_policy
DGS-3420-28SC:admin#
The Switch and the server must be configured exactly the same, using the same
protocol. (For example, if the Switch is set up for TACACS authentication, so must
be the host server.)
4-1enable authen_policy
Description
This command is used to enable system access authentication policy. When enabled, the device
will adopt the login authentication method list to authenticate the user for login, and adopt the
enable authentication mothod list to authenticate the enable password for promoting the user‘s
privilege to Administrator leve l.
Format
enable authen_policy
Parameters
None.
Restrictions
Only Administrator-level users can issue this command.
Example
To enable system access authentication policy:
Command: enable authen_policy
Success.
4-2disable authen_policy
Description
This command is used to disable system access authentication policy. When authentication is
disabled, the device will adopt the local user account database to authenticate the user for login,
and adopt the local enable password to authenticate the enable password for promoting the user‘s
privilege to Administrator leve l.
This command is used to create a user-defined method list of authentication methods for user
login. The maximum supported number of the login method lists is eight.
Format
create authen_login method_list_name <string 15>
Parameters
Restrictions
Only Administrator-level users can issue this command.
Example
To create a user-defined method list for user login:
This command is used to configure a user-defined or default method list of authentication methods
for user login. The sequence of methods will affect the authentication result. For example, if the
sequence is TACACS+ first, then TACACS and local, when a user trys to login, the authentication
request will be sent to the first server host in the TACACS+ built-in server group. If the first server
host in the TACACS+ group is missing, the authentication request will be sent to the second server
host in the TACACS+ group, and so on. If all server hosts in the TACACS+ group are missing, the
authentication request will be sent to the first server host in the TACACS group. If all server hosts
in a TACACS group are missing, the local account database in the device is used to authenticate
this user. When a user logs in to the device successfully while using methods like
TACACS/XTACACS/TACACS+/RADIUS built-in or user-defined server groups or none, the “user”
privilege level is assigned only. If a user wants to get admin privilege level, the user must use the
“enable admin” command to promote his privilege level. But when the local method is used, the
privilege level will depend on this account privilege level stored in the local device.
<string 15> - Specify the user-defined m ethod list na me.
Parameters
<string 15> - Specify the user-defined method list of authentication methods. The method list
tacacs - Specify authentication by the built-in server group TACACS.
xtacacs - Specify authentication by the built-in server group XTACACS.
tacacs+ - Specify authentication by the built-in server group TACACS+.
radius - Specify authentication by the built-in server group RADIUS.
server_group - Specify authentication by the user-defined server group.
<string 15> - Specify authentication by the user-defined server group. The server group
value can be up to 15 characters long.
local - Specify authentication by local user account databas e in the de vice.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure a user-defined method list for user login:
tacacs+ tacacs local
Command: config authen_login method_list_name login_list_1 method tacacs+
tacacs local
Success.
4-6delete authen_login method_list_name
Description
This command is used to delete a user-defined method list of authentication methods for user login.
Format
delete authen_login method_list_name <string 15>
Parameters
Restrictions
Only Administrator-level users can issue this command.
This command is used to display the method list of authentication methods for user login.
Format
show authen_login [default | method_list_name <string 15> | all]
Parameters
<string 15> - Specify the user-defined method list for user login. The method list name can be
Restrictions
Only Administrator-level users can issue this command.
Example
To display a user-defined method list for user login:
Command: show authen_login method_list_name login_list_1
Method List Name Priority Method Name Comment
---------------- -------- --------------- -----------------login_list_1 1 tacacs+ Built-in Group
2 tacacs Built-in Group
3 mix_1 User-defined Group
4 local Keyword
This command is used to create a user-defined method list of authentication methods for
promoting a user's privilege to Admin level. The maximum supported number of the enable method
lists is eight.
Format
create authen_enable method_list_name <string 15>
Parameters
Restrictions
Only Administrator-level users can issue this command.
Example
To create a user-defined method list for promoting a user's privilege to Admin level:
This command is used to configure a user-defined or default method list of authentication methods
for promoting a user's privilege to Admin level. The sequence of methods will effect the
authencation result. For example, if the sequence is TACACS+ first, then TACACS and
local_enable, when a user tries to promote a user's privilege to Admin level, the authentication
request will be sent to the first server host in the TACACS+ built-in server group. If the first server
host in the TACACS+ group is missing, the authentication request will be sent to the second server
host in the TACACS+ group, and so on. If all server hosts in the TACACS+ group are missing, the
authentication request will be sent to the first server host in the TACACS group. If all server hosts
in the TACACS group are missing, the local enable password in the device is used to authenticate
this user’s password. The local enable password in the device can be configured by the CLI
command config admin local_enable.
<string 15> - Specify the user-defined m ethod list name.
Parameters
<string 15> - Specify the user-defined method list of authentication methods. The method list
tacacs - Specify authentication by the built-in server group TACACS.
xtacacs - Specify authentication by the built-in server group XTACACS.
tacacs+ - Specify authentication by the built-in server group TACACS+.
radius - Specify authentication by the built-in server group RADIUS.
server_group - Specify authenticati on b y the user -defined server group.
<string 15> - Specify authentication by the user-defined server group. The server group
value can be up to 15 characters long.
local_enable - Specify authentication by local enab le pass wor d in the device.
Restrictions
Only Administrator-level users can issue this command.
Example
To configure a user-defined method list for promoting a user's privilege to Admin level:
This command is used to create a user-defined authentication server group. The maximum
supported number of server groups including built-in server groups is eight. Each group consists of
eight server hosts as maximum.
Format
create authen server_group <string 15>
Parameters
Restrictions
Only Administrator-level users can issue this command.
Example
To create a user-defined authentication server group:
This command is used to add or remove an authentication server host to or from the specified
server group. Built-in server group tacacs, xtacacs, tacacs+, and RADIUS accept the server host
with the same protocol only, but user-defined server group can accept server hosts with different
protocols. The server host must be created first by using the CLI command create authen
xtacacs - Specify the built-in server group XTACACS.
tacacs+ - Specify the built-in server group TACACS+.
radius – Specify the built-in server group RADIUS.
tacacs - Specify the server host’s authentication protocol TACACS.
xtacacs - Specify the server host’s authentication protocol XTACACS.
tacacs+ - Specify the server host’s authentication protocol TACACS+.
Restrictions
Only Administrator-level users can issue this command.
Example
To add an authentication server host to a server group:
This command is used to create an authentication server host. When an authentication server host
is created, the IP address and protocol are the index. That means more than one authentication
protocol service can be run on the same physical host. The maximum supported number of server
hosts is 16.
tacacs - Specify the server host’s authentication protocol TACACS.
xtacacs - Specify the server host’s authentication protocol XTACACS.
tacacs+ - Specify the server host’s authentication protocol TACACS+.
default value for TACACS/XTACACS/TACACS+ is 49. The default value for RADIUS is 1812.
<int 1-65535> - Specify the port number of the authentication protocol for the server host. The
default value for TACACS/XTACACS/TACACS+ is 49. The default value for RADIUS is
1812. The port number must be between 1 and 65535.
<key_string 254> - Specify the key for TACACS+ and RADIUS authenticaiton. If the value is
null, no encryption will apply. This value is meaningless for TACACS and XTACACS.
none - No encryption for TACACS+ and RADIUS authenticaiton. This value is meaningless
- (Optional) Specify the time in seconds for waiting for a server reply. The default value
is 5 seconds.
<int 1-255> - Specify the time in seconds for waiting for a server reply. The default value is 5
tacacs - Specify the server host’s authentication protocol TACACS.
xtacacs - Specify the server host’s authentication protocol XTACACS.
tacacs+ - Specify the server host’s authentication protocol TACACS+.
for TACACS/XTACACS/TACACS+ is 49. The default value for RADIUS is 1812.
<int 1-65535> - Specify the port number of the authentication protocol for the server host. The
default value for TACACS/XTACACS/TACACS+ is 49. The default value for RADIUS is
- Specify the key for TACACS+ and RADIUS authentication.
<key_string 254> - Specify the key for TACACS+ and RADIUS authentication. If the value is
null, no encryption will apply. This value is meaningless for TACACS and XTACACS.
none - Specify no encryption for TACACS+ and RADIUS authentication. This value is
tacacs - Specify the server host’s authentication protocol TACACS.
xtacacs - Specify the server host’s authentication protocol XTACACS.
tacacs+ - Specify the server host’s authentication protocol TACACS+.
- Specify the server host’s authentication protocol RADIUS.
Restrictions
Only Administrator-level users can issue this command.
This command is used to configure the maximum attempts for users trying to login or promote the
privilege on console, Telnet, or SSH applications. If the failure value is exceeded, connection or
access will be locked.
Format
config authen parameter attempt <int 1-255>
Parameters
Restrictions
Only Administrator-level users can issue this command.
Example
To configure the maximum attempts for users trying to login or promote the privilege to be 9:
Command: config authen parameter attempt 9
Success.
DGS-3420-28SC:admin#
4-24show authen parameter
Description
This command is used to display the authentication parameters.
Only Administrator-level users can issue this command.
Example
To display the authentication parameters:
Command: show authen parameter
Response Timeout : 60 seconds
User Attempts : 9
DGS-3420-28SC:admin#
4-25enable admin
Description
This command is used to promote the "user" privilege level to "admin" level. When the user enters
this command, the authentication method TACACS, XTACAS, TACACS+, user-defined server
groups, local enable, or none will be used to authenticate the user. Because TACACS, XTACACS
and RADIUS don't support the enable function by themselves, if a user wants to use either one of
these three protocols to enable authentication, the user must create a special account on the
server host first, which has a username enable and then configure its password as the enable
password to support the "enable" function. This command cannot be used when authentic ati on
policy is disabled.
encrypt - (Optional) Specifies the encryption type to be used for the password.
sha_1 - Specifies that the password entered should be in SHA-1 encrypted form.
<password> - (Optional) Enter the password value used here. Note that for plain_text
passwords, the password must be 35 bytes long.
DGS-3420-28SC:admin#config admin local_enable
DGS-3420-28SC:admin#
Password:********
DGS-3420-28SC:admin#
4-26config admin local_enable
Description
This command is used to configure the local enable password for the enable command. When the
user chooses the local_enable method to promote the privilege level, the enable password of the
local device is needed.
of data which is identified as a single UDF field. The offset reference is also configurable. It
can be defined to start at the end of the tag, the end of the Ethernet type, or the end of the IP
header.
offset_chunk_1 - Specifies the offset chunk 1 that allows users to examine the specified
offset_chunks within a packet at one time and specifies the frame content offset and mask.
<value 0-31> - Enter the offset chunk 1 value here. This value must be between 0 and 31.
<hex 0x0-0xffffffff> - Enter the offset chunk 1 mask value here.
offset_chunk_2 - Specifies the offset chunk 2 that allows users to examine the specified
offset_chunks within a packet at one time and specifies the frame content offset and mask.
<value 0-31> - Enter the offset chunk 2 value here. This value must be between 0 and 31.
<hex 0x0-0xffffffff> - Enter the offset chunk 2 mask value here.
offset_chunk_3 - Specifies the offset chunk 3 that allows users to examine the specified
offset_chunks within a packet at one time and specifies the frame content offset and mask.
<value 0-31> - Enter the offset chunk 3 value here. This value must be between 0 and 31.
<hex 0x0-0xffffffff> - Enter the offset chunk 3 mask value here.
offset_chunk_4 - Specifies the offset chunk 4 that allows users to examine the specified
offset_chunks within a packet at one time and specifies the frame content offset and mask.
<value 0-31> - Enter the offset chunk 4 value here. This value must be between 0 and 31.
class - Specify the IPv6 class mask.
flowlabel - Specify the IPv6 flow label mask.
source_ipv6_mask - Specify the IPv6 source IP mask.
<ipv6mask> - Specify the IPv6 source IP mask.
destination_ipv6_mask - Specify the IPv6 destinat io n IP mask.
<ipv6mask> - Specify the IPv6 destination IP mask.
tcp - Specify that the rule applies to TCP traffic.
src_port_mask - (Optional) Specify the TCP source port mask.
<hex 0x0-0xffff> - Specify the TCP source port mask.
dst_port_mask - (Optional) Specify the TCP destination port mask.
<hex 0x0-0xffff> - Specify the TCP destination port mask.
udp - Specify that the rule applies to UDP traffic.
src_port_mask - (Optional) Specify the TCP source port mask.
<hex 0x0-0xffff> - Specify the TCP source port mask.
dst_port_mask - (Optional) Specify the TCP destination port mask.
<hex 0x0-0xffff> - Specify the TCP destination port mask.
icmp - Specify that the rule applies to ICMP traffic.
type - (Optional) Specify the ICMP packet type.
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
packet_content - Specify the packet content for the user defined mask.
vlan - Specify the VLAN name.
<vlan_name 32> -Specify the VLAN name. The maximum length is 32 characters.
vlanid - Specify the VLAN ID.
<vlanid 1-4094> - Specify the VLAN ID between 1 and 4094.
mask - (Optional)Specify the mask.
<hex 0x0-0x0fff> - Specify the mask.
source_ip - Specify an IP source address.
<ipaddr> - Specify an IP source address.
mask - (Optional) Specify the mask.
<netmask> - Specify the mask.
destination_ip - Specify an IP destination address.
<ipaddr> - Specify an IP destination address.
mask - (Optional) Specify the mask.
<netmask> - Specify the mask.
dscp - Specify the value of DSCP.
<value 0-63> - Specify the value of DSCP. The DSCP value ranges from 0 to 63.
icmp - Specify the ICMP.
type - (Optional) Specify that the rule will apply to the ICMP Type traffic value.
<value 0-255> - Specify the value between 0 and 255.
code - (Optional) Specify that the rule will apply to the ICMP Code traffic value.
<value 0-255> - Specify the value between 0 and 255.
igmp - Specify the IGMP.
type - (Optional) Specify that the rule will apply to the IGMP Type traffic value.
<value 0-255> - Specify the value between 0 and 255.
tcp - Specify TCP.
src_port - (Optional) Specify that the rule will apply to a range of TCP source ports.
<value 0-65535> - Spec ify the value between 0 and 65535.
mask - (Optional) Specify the mask.
<hex 0x0-0xffff> - Specify the mask.
dst_port - (Optional) Specify that the rule will apply to a range of TCP destination ports.
<value 0-65535> - Specif y the value between 0 and 65535.
mask - (Optional) Specify the mask.
<hex 0x0-0xffff> - Specify the mask.
flag - Specify the TCP flag field value.
all – Specify to check all paramenters below.
urg - (Optional) Specify Urgent Pointer field significant.
ack - (Optional) Specify Acknowledgment field significant.
psh - (Optional) Specify Push Function.
rst - (Optional) Specify to reset the connection.
syn - (Optional) Specify to synchronize sequence numbers.
fin - (Optional) No more data from sender.
udp - Specify UDP.
src_port - (Optional) Specify the UDP source port range.
<value 0-65535> - Spec ify the value between 0 and 65535.
mask - (Optional) Specify the mask.
<hex 0x0-0xffff> - Specify the mask.
dst_port - (Optional) Specify the UDP destination port range.
<value 0-65535> - Spec ify the value between 0 and 65535.
mask - (Optional) Specify the mask.
<hex 0x0-0xffff> - Specify the mask.
protocol_id - Specify that the rule will apply to the value of IP protocol ID traffic.
<value 0-255> - Specify the value between 0 and 255.
user_define - (Optional) Specify that the rule will apply to the IP protocol ID and that the mask
options behind the IP header, which has a length of 4 bytes.
<hex 0x0-0xffffffff> - Specify that the rule will apply to the IP protocol ID and that the
mask options behind the IP header, which has a length of 4 bytes.
This command is used to display the current access list table.
Format
show access_profile {[profile_id <value 1-6> | profile_name <name 1-32>]}
Parameters
Restrictions
None.
Example
To display the current access list table:
Command: show access_profile
Access Profile Table
Total User Set Rule Entries : 3
Total Used HW Entries : 19
Total Available HW Entries : 1005
===============================================================================
=
Profile ID: 1 Profile Name: 1 Type: Ethernet
Mask on
VLAN ID : 0xFF
Source MAC: FF-FF-FF-FF-FF-00
user. “Total Used HW Entries” indicates the total number of hardware entries used
in the device. “Available HW Entries” indicates the total number of available
hardware entries in the device.
To display an access profile that supports an entry mask for each rule:
Command: show access_profile profile_id 2
Access Profile Table
Profile ID: 2 Profile Name: 2 Type: Ethernet
Mask on
VLAN : 0xF
Source MAC : FF-FF-FF-00-00-00
Destination MAC : 00-00-00-FF-FF-FF
Available HW Entries: 255
This command is used to define a specific range of time to activate a function on the Switch by
specifying which time range in a day and which days in a week are covered in the time range. Note
that the specified time range is based on SNTP time or configured time. If this time is not available,
then the time range will not be met.
Format
config time_range <range _nam e 32> [ hours start_time < hh:mm:ss> end_time< h h :m m :ss>
weekdays <daylist> | delete]
Parameters
7PM. 19 is also acceptable. The start_time must be smaller than the end_time.
- Specify the ending time in a day. (24-hr time)
- Specify the time.
days. Use a comma to separate specific days. For example, mon-fri (Monday to Friday)
sun, mon, fri (Sunday, Monday, and Friday)
Restrictions
Only Administrator, Operator and Power-User level users can issue this command.
Example
To configure the range of time to activate a function on the switch:
------------------------Range Name : testdaily
Weekdays : Mon,Fri
Start Time : 12:00:00
End Time : 13:00:00
Total Entries :1
DGS-3420-28SC:admin#
5-7show current_config access_profile
Description
This command is used to display the ACL part of the current configuration, when logged in with
user level privileges. The overall current configuration can be displayed by using the show config
command, which is accessible with administrator level privileges.