Administrator Guide

1 About this Guide..........................................................................................................................31
Audience................................................................................................................................................................................31
Conventions.......................................................................................................................................................................... 31
Related Documents..............................................................................................................................................................31
2 Configuration Fundamentals....................................................................................................... 32
Accessing the Command Line............................................................................................................................................32
CLI Modes............................................................................................................................................................................ 32
Navigating CLI Modes...................................................................................................................................................34
The do Command................................................................................................................................................................36
Undoing Commands............................................................................................................................................................ 37
Obtaining Help......................................................................................................................................................................37
Entering and Editing Commands....................................................................................................................................... 37
Command History................................................................................................................................................................38
Filtering show Command Outputs.................................................................................................................................... 38
Multiple Users in Configuration Mode.............................................................................................................................. 40
3 Getting Started.......................................................................................................................... 41
Console Access....................................................................................................................................................................42
Serial Console.................................................................................................................................................................42
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... 43
Default Configuration..........................................................................................................................................................44
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 44
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 45
Configuration File Management........................................................................................................................................ 46
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 48
Configure the Overload Bit for a Startup Scenario...................................................................................................48
Viewing Files...................................................................................................................................................................48
Compressing Configuration Files.................................................................................................................................49
Managing the File System...................................................................................................................................................51
Enabling Software Features on Devices Using a Command Option.............................................................................52
View Command History......................................................................................................................................................52
Upgrading Dell EMC Networking OS................................................................................................................................54
Verify Software Images Before Installation......................................................................................................................54
Using HTTP for File Transfers...........................................................................................................................................55
4 Management..............................................................................................................................56
Configuring Privilege Levels...............................................................................................................................................56
Contents
Contents 3