Users Guide

Chapter 1: About this Guide........................................................................................................... 28
Audience............................................................................................................................................................................... 28
Conventions......................................................................................................................................................................... 28
Related Documents.............................................................................................................................................................28
Chapter 2: Configuration Fundamentals..........................................................................................29
Accessing the Command Line........................................................................................................................................... 29
CLI Modes............................................................................................................................................................................ 29
Navigating CLI Modes....................................................................................................................................................31
The do Command................................................................................................................................................................ 33
Undoing Commands............................................................................................................................................................34
Obtaining Help..................................................................................................................................................................... 34
Entering and Editing Commands.......................................................................................................................................35
Command History................................................................................................................................................................35
Filtering show Command Outputs.................................................................................................................................... 36
Multiple Users in Configuration Mode...............................................................................................................................37
Chapter 3: Getting Started............................................................................................................ 38
Console Access....................................................................................................................................................................38
Serial Console.................................................................................................................................................................38
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... 39
Default Configuration..........................................................................................................................................................40
Configuring a Host Name...................................................................................................................................................40
Accessing the System Remotely.......................................................................................................................................40
Configure the Management Port IP Address............................................................................................................. 41
Configure a Management Route.................................................................................................................................. 41
Configuring a Username and Password...................................................................................................................... 41
Configuring the Enable Password......................................................................................................................................41
Configuration File Management........................................................................................................................................ 42
Copy Files to and from the System.............................................................................................................................42
Mounting an NFS File System..................................................................................................................................... 43
Save the Running-Configuration................................................................................................................................. 44
Configure the Overload Bit for a Startup Scenario...................................................................................................44
Viewing Files...................................................................................................................................................................44
Compressing Configuration Files.................................................................................................................................45
Managing the File System.................................................................................................................................................. 47
Enabling Software Features on Devices Using a Command Option.............................................................................48
View Command History......................................................................................................................................................48
Upgrading Dell Networking OS..........................................................................................................................................49
Using Hashes to Verify Software Images Before Installation............................................................................ 49
Using HTTP for File Transfers...........................................................................................................................................50
Chapter 4: Management.................................................................................................................51
Configuring Privilege Levels................................................................................................................................................51
Contents
Contents 3