Do you have a question about the Dell PowerConnect 3524 and is the answer not in the manual?
Throughput | 9.5 Mpps |
---|---|
Number of queues | 4 |
MAC address table | 8000 entries |
Maximum data transfer rate | 0.1 Gbit/s |
Supported data transfer rates | 10/100 Mbps |
10G support | No |
Number of VLANs | 256 |
Flow control support | Yes |
Networking standards | IEEE 802.1D, IEEE 802.1p, IEEE 802.1Q, IEEE 802.1s, IEEE 802.1w, IEEE 802.3ad |
Input frequency | 50/60 Hz |
Weight (imperial) | 11 lbs |
Dimensions (WxDxH) | 440 x 257 x 43.2 mm |
Networking features | Gigabit Ethernet, Fast Ethernet |
Authentication method | RADIUS, TACACS+ |
Connectivity technology | Wired |
Dimensions (W x D x H) (imperial) | 17.3 x 10.12 x 1.7 \ |
Switch type | Managed |
Switch layer | L2 |
Data link protocols | Ethernet |
Supported network protocols | HTTP, HTTPS/SSL, SSH |
Power connector | DC-in jack |
Gigabit Ethernet (copper) ports quantity | 2 |
Basic switching RJ-45 Ethernet ports quantity | 24 |
Product color | Black |
Power source | AC |
Input voltage | 100 - 240 V |
Storage temperature (T-T) | -20 - 70 °C |
Operating temperature (T-T) | 0 - 45 °C |
Storage relative humidity (H-H) | 10 - 95 % |
Operating relative humidity (H-H) | 10 - 90 % |
Weight | 5000 g |
---|
Describes the different command modes used for configuring the device, such as User EXEC, Privileged EXEC, and Configuration modes.
Details the steps for connecting to the device console port or via Telnet to start using the CLI.
Configures connection security, including authorization and passwords.
Configures Access Control Lists (ACLs) on the device.
Configures bridging Address Tables and related multicast operations.
Manages device configuration files and system images, including copy and delete operations.
Configures DHCP snooping to enhance network security by preventing rogue DHCP servers.
Configures Ethernet port parameters, including speed, duplex, flow control, and storm control.
Configures IP addresses, default gateways, and DNS settings for interfaces.
Configures IPv6 addresses, autoconfiguration, and related ICMP settings.
Configures management access lists to control access to the device.
Configures port channels for link aggregation.
Configures Quality of Service (QoS) parameters for traffic management.
Configures and displays RADIUS server settings for authentication.
Configures SNMP settings, including communities, views, users, and traps.
Configures and manages Spanning Tree protocol behavior.
Configures SSH server settings, key generation, and public key authentication.
Manages and displays syslog messages, including logging destinations and buffering.
Provides commands for system-level operations like ping, traceroute, reload, and host management.
Configures TACACS+ server settings for centralized authentication and authorization.
Configures Virtual LANs (VLANs), including database management and port assignments.
Configures IEEE 802.1X authentication for port access control.
Commands that affect the entire system configuration globally.
Commands to modify specific interface operations.
Configures conditions for traffic filtering based on MAC addresses.
Provides access to restricted commands and configuration modes.
Manually specifies device SSH public keys.
The initial mode for basic tests and system information listing.
Enters VLAN database configuration and creates/configures VLANs.
Configures conditions for traffic filtering based on IP addresses.
Configures conditions for traffic filtering based on MAC addresses.
Defines login authentication methods for users.
Defines authentication method lists for accessing higher privilege levels.
Specifies the login authentication method list for remote Telnet or console access.
Specifies the authentication method list for accessing higher privilege levels.
Defines an IPv4 access list and enters IPv4 ACL configuration mode.
Permits traffic if conditions in the permit statement match.
Denies traffic if conditions in the deny statement match.
Creates Layer 2 ACLs based on MAC addresses.
Sets permit conditions for a MAC access list.
Denies traffic if conditions in the deny statement match.
Adds a static MAC-layer station source address to the bridge table.
Locks the port and prevents learning new addresses.
Configures the port security learning mode.
Configures the maximum number of addresses learned on a port.
Adds MAC-layer secure addresses to a routed port.
Manually sets the system clock time and date.
Configures an external time source for the system clock.
Copies files from a source to a destination, supporting various URL prefixes.
Deletes files from flash memory devices.
Deletes the startup configuration file.
Specifies the system image loaded at startup.
Globally enables DHCP snooping.
Enables DHCP snooping on a specific VLAN.
Configures a port as trusted for DHCP snooping purposes.
Enters interface configuration mode for an Ethernet type interface.
Configures multiple Ethernet type interfaces simultaneously.
Disables an interface.
Configures the full/half duplex operation of an Ethernet interface.
Enables auto-negotiation for speed and duplex parameters.
Configures flow control on a given interface.
Enables GVRP globally on the device.
Enables GVRP on a specific interface.
Globally enables Internet Group Management Protocol (IGMP) snooping.
Enables IGMP snooping on a specific VLAN interface.
Sets an IP address for an interface.
Acquires an IP address from a DHCP server for an interface.
Defines a default gateway (router) for the device.
Enables IPv6 processing on an interface.
Enables automatic IPv6 address configuration using stateless autoconfiguration.
Configures an IPv6 address for an interface.
Configures an IPv6 link-local address for an interface.
Defines an IPv6 default gateway.
Configures the system LACP priority.
Configures the priority value for physical ports.
Identifies a specific line for configuration and enters line configuration mode.
Configures the line baud rate.
Defines a management access list and enters access list configuration mode.
Defines a permit rule for management access.
Defines a deny rule for management access.
Restricts management connections by defining the active management access list.
Enables Link Layer Discovery Protocol (LLDP) globally.
Enables LLDP on a specific interface.
Specifies and enables a message displayed when an EXEC process is created.
Specifies and enables a message displayed before login prompts.
Specifies and enables a message-of-the-day banner.
Diagnoses copper cable quality and characteristics using TDR technology.
Configures the administrative mode of inline power on an interface.
Enters interface configuration mode for a specific port-channel.
Configures multiple port-channels simultaneously.
Associates a port with a port-channel.
Starts a port monitoring session, copying traffic to another port.
Enables Quality of Service (QoS) on the device.
Specifies a RADIUS server host and its connection parameters.
Sets the authentication and encryption key for RADIUS communications.
Displays RMON Ethernet statistics for ports.
Configures the community access string for SNMP protocol access.
Creates or updates a Simple Network Management Protocol (SNMP) server view entry.
Configures an SNMP group or maps users to SNMP views.
Configures a new SNMP Version 3 user.
Specifies the SNMP engineID on the local device.
Specifies the recipient of SNMPv1 or SNMPv2 notifications.
Specifies the recipient of SNMP Version 3 notifications.
Enables spanning-tree functionality.
Configures the Spanning Tree protocol mode (STP, RSTP, MSTP).
Disables Spanning Tree on a specific port.
Configures the Spanning Tree path cost for a port.
Configures port priority for MST instances.
Enables PortFast mode for faster interface transition to forwarding state.
Enables configuring an MST region.
Enables root guard on an interface to restrict it as a root port.
Specifies the TCP port to be used by the SSH server.
Enables device configuration from an SSH server.
Generates DSA key pairs for SSH encryption.
Generates RSA key pairs for SSH encryption.
Enables public key authentication for incoming SSH sessions.
Enters SSH Public Key-chain configuration mode for specifying public keys.
Specifies which SSH public key is manually configured.
Manually specifies an SSH public key.
Controls error message logging, sending messages to designated locations.
Logs messages to a syslog server.
Sends ICMP echo request packets to another node on the network.
Discovers routes that packets take when traveling to their destination.
Reloads the operating system.
Specifies or modifies the device host name.
Specifies a TACACS+ host and its connection parameters.
Sets the authentication encryption key for TACACS+ communications.
Sets the minimum length required for passwords in the local database.
Enters tunnel interface configuration mode.
Enters the Privileged EXEC mode.
Returns to User EXEC mode.
Enters the Global Configuration mode.
Enters the VLAN database configuration mode.
Creates a VLAN.
Enters the Interface Configuration (VLAN) mode.
Enables simultaneous configuration of multiple VLANs.
Configures the VLAN ID when the interface is in access mode.
Adds or removes VLANs to or from a trunk port.
Configures the VLAN membership mode of a port.
Enables automatic voice VLAN configuration for a port.
Generates a self-signed HTTPS certificate.
Generates and displays certificate requests for HTTPS.
Specifies AAA methods for interfaces running IEEE 802.1X authentication.
Enables 802.1X authentication globally.
Enables manual control of the authorization state of the port.