Users Guide

mask: a subnet mask in /prefix-length format (/ xx).
gateway: the next hop for network traffic originating from the management port.
Configuring a Username and Password
To access the system remotely, you must configure a system username and password.
Configure a username and password to access the system remotely.
CONFIGURATION mode
username username password [encryption-type] password
encryption-type: specifies how you are inputting the password, is 0 by default, and is not required.
* 0 is for inputting the password in clear text.
* 7 is for inputting a password that is already encrypted using a Type 7 hash. Obtaining the encrypted password from
the configuration of another Dell Networking system.
Configuring the Enable Password
Access EXEC Privilege mode using the enable command. EXEC Privilege mode is unrestricted by default. Configure a
password as a basic security measure.
There are three types of enable passwords:
enable password is stored in the running/startup configuration using a DES encryption method.
enable secret is stored in the running/startup configuration using MD5 encryption method.
enable sha256-password is stored in the running/startup configuration using sha256-based encryption method
(PBKDF2).
Dell Networking recommends using the enable sha256-password password.
To configure an enable password, use the following command.
Create a password to access EXEC Privilege mode.
CONFIGURATION mode
enable [password | secret | sha256-password] [level level] [encryption-type] password
level: is the privilege level, is 15 by default, and is not required.
encryption-type: specifies how you input the password, is 0 by default, and is not required.
* 0 is to input the password in clear text.
* 5 is to input a password that is already encrypted using MD5 encryption method. Obtain the encrypted password
from the configuration file of another device.
* 7 is to input a password that is already encrypted using DES encryption method. Obtain the encrypted password
from the configuration file of another device.
* 8 is to input a password that is already encrypted using sha256-based encryption method. Obtain the encrypted
password from the configuration file of another device.
Manage Configuration Files
Files can be stored on and accessed from various storage media. Rename, delete, and copy files on the system from EXEC
Privilege mode.
Getting Started 49