Administrator Guide

1 About this Guide......................................................................................................................... 30
Audience............................................................................................................................................................................... 30
Conventions......................................................................................................................................................................... 30
Related Documents.............................................................................................................................................................30
2 Configuration Fundamentals........................................................................................................ 31
Accessing the Command Line............................................................................................................................................ 31
CLI Modes............................................................................................................................................................................. 31
Navigating CLI Modes...................................................................................................................................................33
The do Command................................................................................................................................................................35
Undoing Commands............................................................................................................................................................36
Obtaining Help..................................................................................................................................................................... 36
Entering and Editing Commands....................................................................................................................................... 36
Command History................................................................................................................................................................37
Filtering show Command Outputs.....................................................................................................................................37
Multiple Users in Configuration Mode.............................................................................................................................. 39
3 Getting Started..........................................................................................................................40
Console Access....................................................................................................................................................................40
Serial Console.................................................................................................................................................................40
Accessing the CLI Interface and Running Scripts Using SSH........................................................................................41
Default Configuration..........................................................................................................................................................42
Configuring a Host Name................................................................................................................................................... 42
Accessing the System Remotely.......................................................................................................................................42
Configure the Management Port IP Address.............................................................................................................42
Configure a Management Route................................................................................................................................. 43
Configuring a Username and Password......................................................................................................................43
Configuring the Enable Password..................................................................................................................................... 44
Configuration File Management........................................................................................................................................ 44
Copy Files to and from the System.............................................................................................................................44
Mounting an NFS File System..................................................................................................................................... 45
Save the Running-Configuration................................................................................................................................. 46
Configure the Overload Bit for a Startup Scenario................................................................................................... 47
Viewing Files................................................................................................................................................................... 47
Compressing Configuration Files................................................................................................................................. 48
Managing the File System..................................................................................................................................................50
Enabling Software Features on Devices Using a Command Option.............................................................................50
View Command History.......................................................................................................................................................51
Upgrading Dell EMC Networking OS................................................................................................................................52
Verify Software Images Before Installation......................................................................................................................52
Using HTTP for File Transfers........................................................................................................................................... 53
4 Management..............................................................................................................................55
Configuring Privilege Levels...............................................................................................................................................55
Contents
Contents 3