Administrator Guide

1 About this Guide......................................................................................................................... 33
Audience............................................................................................................................................................................... 33
Conventions......................................................................................................................................................................... 33
Related Documents.............................................................................................................................................................33
2 Configuration Fundamentals....................................................................................................... 34
Accessing the Command Line............................................................................................................................................34
CLI Modes............................................................................................................................................................................ 34
Navigating CLI Modes...................................................................................................................................................36
The do Command................................................................................................................................................................38
Undoing Commands............................................................................................................................................................39
Obtaining Help..................................................................................................................................................................... 39
Entering and Editing Commands....................................................................................................................................... 39
Command History................................................................................................................................................................40
Filtering show Command Outputs.................................................................................................................................... 40
Multiple Users in Configuration Mode............................................................................................................................... 41
3 Getting Started..........................................................................................................................42
Console Access....................................................................................................................................................................42
Serial Console.................................................................................................................................................................42
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... 43
Default Configuration..........................................................................................................................................................44
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 45
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 46
Configuration File Management........................................................................................................................................ 46
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 48
Configure the Overload Bit for a Startup Scenario...................................................................................................49
Viewing Files...................................................................................................................................................................49
Compressing Configuration Files.................................................................................................................................50
Managing the File System..................................................................................................................................................52
Enabling Software Features on Devices Using a Command Option.............................................................................52
View Command History......................................................................................................................................................53
Upgrading Dell EMC Networking OS................................................................................................................................54
Verify Software Images Before Installation......................................................................................................................54
Using HTTP for File Transfers...........................................................................................................................................55
4 Management..............................................................................................................................57
Configuring Privilege Levels............................................................................................................................................... 57
Contents
Contents 3