Users Guide

Chapter 1: About this Guide........................................................................................................... 29
Audience............................................................................................................................................................................... 29
Conventions......................................................................................................................................................................... 29
Related Documents.............................................................................................................................................................29
Chapter 2: Configuration Fundamentals..........................................................................................30
Accessing the Command Line........................................................................................................................................... 30
CLI Modes............................................................................................................................................................................ 30
Navigating CLI Modes...................................................................................................................................................32
The do Command................................................................................................................................................................ 34
Undoing Commands............................................................................................................................................................35
Obtaining Help..................................................................................................................................................................... 35
Entering and Editing Commands....................................................................................................................................... 36
Command History................................................................................................................................................................36
Filtering show Command Outputs.....................................................................................................................................37
Multiple Users in Configuration Mode...............................................................................................................................37
Chapter 3: Getting Started............................................................................................................ 39
Console Access....................................................................................................................................................................39
Serial Console.................................................................................................................................................................39
Accessing the CLI Interface and Running Scripts Using SSH.......................................................................................40
Default Configuration...........................................................................................................................................................41
Configuring a Host Name....................................................................................................................................................41
Accessing the System Remotely........................................................................................................................................41
Configure the Management Port IP Address.............................................................................................................42
Configure a Management Route................................................................................................................................. 42
Configuring a Username and Password......................................................................................................................42
Configuring the Enable Password..................................................................................................................................... 42
Configuration File Management........................................................................................................................................ 43
Copy Files to and from the System.............................................................................................................................43
Mounting an NFS File System..................................................................................................................................... 44
Save the Running-Configuration................................................................................................................................. 45
Configure the Overload Bit for a Startup Scenario...................................................................................................45
Viewing Files...................................................................................................................................................................45
Compressing Configuration Files.................................................................................................................................46
Managing the File System..................................................................................................................................................48
Enabling Software Features on Devices Using a Command Option.............................................................................49
View Command History......................................................................................................................................................49
Upgrading Dell Networking OS..........................................................................................................................................50
Verify Software Images Before Installation......................................................................................................................50
Using HTTP for File Transfers............................................................................................................................................51
Chapter 4: Management................................................................................................................ 52
Configuring Privilege Levels...............................................................................................................................................52
Contents
Contents 3