Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

Dell PowerProtect Data Manager Appliance 5.12.0.1 Administrator Guide for DM5500

System access using Command Line Interface

The PowerProtect Data Manager Appliance provides secure administration through HTTPS and SSH for CLI.

Manager over HTTPS
The system can use an imported certificate to establish a trusted connection to manage the system over SSL. If a certificate is not provided, the system can use its self-signed identity certificate.
NOTE By default HTTPS is enabled and HTTP is disabled.
SSH for CLI
The administrator enters a Command Line Interface, where individual Command Line Interface commands manage the system.
NOTE When connecting to the HA system using the floating hostname or IP using the SSH client, the public key that is stored in the known-hosts list of the local shell may fail verification. Each node in the HA pair generates a unique SSH key pair, and the active node presents the key that it owns. Resolution for this issue is to physically verify that the correct system is connecting, and remove the offending key from the known-host list and revalidate the key on the next connection try.

Administrative system access can be either local or remote.

  • To log in using SSH, minimum SSH version that is supported is OpenSSH v4.7p1.
  • To log in with FIPS enabled on a protection system or DDVE instance using SSH, the minimum supported SSH version is OpenSSH v5.9p1.
Local access
Authorized administrators with valid login credentials have access to CLI through serial console or IP in same subnet. User is prompted for username and password, and after authentication and authorization, they are granted login access.
Remote access
CLI and Web-based System Manager remote access are available for authorized administrators with proper login credentials (username and password).

Dell Technologies recommends limiting CLI- and GUI-based access with an allowed list based on fully qualified hostname, IPv4 address, or IPv6 address to prevent remote access over the network by unauthorized hosts.

NOTE SSH and secure browsing (HTTPS) are enabled by default.
NOTE Only user with Security officer role can run authorization show history command.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\