To view the FTP configuration, use the show running-config ftp command in EXEC privilege mode,as shown in the example for Enable FTP Server.Terminal LinesYou can access the system remotely and restrict access to the system by creating user profiles.Terminal lines on the system provide different means of accessing the system. The console line (console)connects you through the console port in the route processor modules (RPMs). The virtual terminal lines(VTYs) connect you through Telnet to the system. The auxiliary line (aux) connects secondary devicessuch as modems.Denying and Permitting Access to a Terminal LineDell Networking recommends applying only standard access control lists (ACLs) to deny and permitaccess to VTY lines.• Layer 3 ACLs deny all traffic that is not explicitly permitted, but in the case of VTY lines, an ACL withno rules does not deny traffic.• You cannot use the show ip accounting access-list command to display the contents of anACL that is applied only to a VTY line.To apply an IP ACL to a line, Use the following command.• Apply an ACL to a VTY line.LINE modeip access-class access-listExample of an ACL that Permits Terminal AccessTo view the configuration, use the show config command in LINE mode.Dell(config-std-nacl)#show config!ip access-list standard myvtyaclseq 5 permit host 10.11.0.1Dell(config-std-nacl)#line vty 0Dell(config-line-vty)#show configline vty 0access-class myvtyaclDell Networking OS Behavior: Prior to Dell Networking OS version 7.4.2.0, in order to deny access on aVTY line, apply an ACL and accounting, authentication, and authorization (AAA) to the line. Then users aredenied access only after they enter a username and password. Beginning in Dell Networking OS version7.4.2.0, only an ACL is required, and users are denied access before they are prompted for a usernameand password.Configuring Login Authentication for Terminal LinesYou can use any combination of up to six authentication methods to authenticate a user on a terminalline.A combination of authentication methods is called a method list. If the user fails the first authenticationmethod, Dell Networking OS prompts the next method until all methods are exhausted, at which pointthe connection is terminated. The available authentication methods are:Management 71