Administrator Guide

Conguring FTP Client Parameters
To congure FTP client parameters, use the following commands.
Enter the following keywords and the interface information:
For a 1-GigabitEthernet interface, enter the keyword GigabitEthernet then the slot/port information.
For a 10-Gigabit Ethernet interface, enter the keyword TenGigabitEthernet then the slot/port information.
For a Loopback interface, enter the keyword loopback then a number from 0 to 16383.
For a port channel interface, enter the keywords port-channel then a number.
For a VLAN interface, enter the keyword vlan then a number from 1 to 4094.
CONFIGURATION mode
ip ftp source-interface interface
Congure a password.
CONFIGURATION mode
ip ftp password password
Enter a username to use on the FTP client.
CONFIGURATION mode
ip ftp username name
To view the FTP conguration, use the show running-config ftp command in EXEC privilege mode, as shown in the example for
Enable FTP Server.
Terminal Lines
You can access the system remotely and restrict access to the system by creating user proles.
Terminal lines on the system provide dierent means of accessing the system. The console line (console) connects you through the console
port in the route processor modules (RPMs). The virtual terminal lines (VTYs) connect you through Telnet to the system. The auxiliary line
(aux) connects secondary devices such as modems.
Denying and Permitting Access to a Terminal Line
Dell EMC Networking recommends applying only standard access control lists (ACLs) to deny and permit access to VTY lines.
Layer 3 ACLs deny all trac that is not explicitly permitted, but in the case of VTY lines, an ACL with no rules does not deny trac.
You cannot use the show ip accounting access-list command to display the contents of an ACL that is applied only to a
VTY line.
When you use the access-class access-list-name command without specifying the ipv4 or ipv6 attribute, both IPv4 as
well as IPv6 rules that are dened in that ACL are applied to the terminal. This method is a generic way of conguring access
restrictions.
To be able to lter access exclusively using either IPv4 or IPv6 rules, use either the ipv4 or ipv6 attribute along with the access-
class access-list-name command. Depending on the attribute that you specify (ipv4 or ipv6), the ACL processes either
IPv4 or IPv6 rules, but not both. Using this conguration, you can set up two dierent types of access classes with each class
processing either IPv4 or IPv6 rules separately.
To apply an IP ACL to a line, Use the following command.
Apply an ACL to a VTY line.
LINE mode
80
Management