Reference Guide
2
Configuration Fundamentals
The Dell Networking operating system (FTOS) command line interface (CLI) is a text-based interface you can use to
configure interfaces and protocols.
The CLI is largely the same for the Z9000, S4810, and S4820T except for some commands and command outputs. The CLI
is structured in modes for security and management purposes. Different sets of commands are available in each mode,
and you can limit user access to modes using privilege levels.
In FTOS, after you enable a command, it is entered into the running configuration file. You can view the current
configuration for the whole system or for a particular CLI mode. To save the current configuration, copy the running
configuration to another location.
NOTE: Due to differences in hardware architecture and continued system development, features may occasionally
differ between the platforms. Differences are noted in each CLI description and related documentation.
Accessing the Command Line
Access the CLI through a serial console port or a Telnet session.
When the system successfully boots, enter the command line in EXEC mode.
NOTE: You must have a password configured on a virtual terminal line before you can Telnet into the system.
Therefore, you must use a console connection when connecting to the system for the first time.
telnet 172.31.1.53
Trying 172.31.1.53...
Connected to 172.31.1.53.
Escape character is '^]'.
Login: username
Password:
FTOS>
CLI Modes
Different sets of commands are available in each mode.
A command found in one mode cannot be executed from another mode (except for EXEC mode commands with a
preceding do command (refer to the do Command section).
You can set user access rights to commands and command modes using privilege levels; for more information about
privilege levels and security options, refer to the
Privilege Levels Overview
section in the Security chapter.
The FTOS CLI is divided into three major mode levels:
• EXEC mode is the default mode and has a privilege level of 1, which is the most restricted level. Only a limited
selection of commands is available, notably the show commands, which allow you to view system information.
• EXEC Privilege mode has commands to view configurations, clear counters, manage configuration files, run
diagnostics, and enable or disable debug operations. The privilege level is 15, which is unrestricted. You can
configure a password for this mode; refer to the
Configure the Enable Password
section in the Getting Started
chapter.
• CONFIGURATION mode allows you to configure security features, time settings, set logging and SNMP
functions, configure static ARP and MAC addresses, and set line cards on the system.
33










