Connectivity Guide

Table Of Contents
Configuration Fundamentals
The Dell EMC Networking Operating System (OS) command line interface (CLI) is a text-based interface you can use to
configure interfaces and protocols.
The CLI is largely the same for each platform except for some commands and command outputs. The CLI is structured in modes
for security and management purposes. Different sets of commands are available in each mode, and you can limit user access to
modes using privilege levels.
In the Dell EMC Networking OS, after you enter a command, the command is added to the running configuration file. You can
view the current configuration for the whole system or for a particular CLI mode. To save the current configuration, copy the
running configuration to another location.
NOTE: Due to differences in hardware architecture and continued system development, features may occasionally differ
between the platforms. Differences are noted in each CLI description and related documentation.
Topics:
Accessing the Command Line
CLI Modes
The do Command
Undoing Commands
Obtaining Help
Entering and Editing Commands
Command History
Filtering show Command Outputs
Multiple Users in Configuration Mode
Accessing the Command Line
Access the CLI through a serial console port or a Telnet session.
When the system successfully boots, enter the command line in EXEC mode.
NOTE:
You must have a password configured on a virtual terminal line before you can Telnet into the system. Therefore,
you must use a console connection when connecting to the system for the first time.
telnet 172.31.1.53
Trying 172.31.1.53...
Connected to 172.31.1.53.
Escape character is '^]'.
Login: username
Password:
DellEMC>
CLI Modes
Different sets of commands are available in each mode.
A command found in one mode cannot be executed from another mode (except for EXEC mode commands with a preceding do
command (refer to the do Command section).
You can set user access rights to commands and command modes using privilege levels.
For more information about privilege levels and security options, refer to the Privilege Levels Overview section in the Security
chapter.
2
Configuration Fundamentals 33