Users Guide

Contents
1 About this Guide.....................................................................................................................................................31
Audience.....................................................................................................................................................................31
Conventions...............................................................................................................................................................31
Related Documents..................................................................................................................................................31
2 Configuration Fundamentals.............................................................................................................................. 32
Accessing the Command Line...............................................................................................................................32
CLI Modes.................................................................................................................................................................. 32
Navigating CLI Modes........................................................................................................................................34
The do Command....................................................................................................................................................36
Undoing Commands................................................................................................................................................37
Obtaining Help.......................................................................................................................................................... 37
Entering and Editing Commands..........................................................................................................................38
Command History....................................................................................................................................................39
Filtering show Command Outputs....................................................................................................................... 39
Example of the grep Keyword......................................................................................................................... 39
Multiple Users in Configuration Mode.................................................................................................................40
3 Getting Started.......................................................................................................................................................41
Console Access.........................................................................................................................................................42
Serial Console......................................................................................................................................................42
Default Configuration..............................................................................................................................................43
Configuring a Host Name.......................................................................................................................................43
Accessing the System Remotely........................................................................................................................... 43
Accessing the System Remotely..................................................................................................................... 44
Configure the Management Port IP Address................................................................................................44
Configure a Management Route.....................................................................................................................44
Configuring a Username and Password........................................................................................................44
Configuring the Enable Password........................................................................................................................ 45
Configuration File Management........................................................................................................................... 45
Copy Files to and from the System.................................................................................................................45
Mounting an NFS File System.......................................................................................................................... 46
Save the Running-Configuration.................................................................................................................... 48
Configure the Overload Bit for a Startup Scenario..................................................................................... 48
Viewing Files........................................................................................................................................................ 48
Managing the File System.......................................................................................................................................49
View Command History..........................................................................................................................................50
Upgrading Dell Networking OS.............................................................................................................................50
Using HTTP for File Transfers................................................................................................................................ 50
Verify Software Images Before Installation..........................................................................................................51
4 Management.......................................................................................................................................................... 53
Configuring Privilege Levels...................................................................................................................................53
Contents
3