Users Guide
View Conguration Files
Conguration les have three commented lines at the beginning of the le, as shown in the following example, to help you track the last
time any user made a change to the le, which user made the changes, and when the le was last saved to the startup-conguration.
In the running-conguration le, if there is a dierence between the timestamp on the “Last conguration change” and “Startup-cong last
updated,” you have made changes that have not been saved and are preserved after a system reboot.
Example of the show running-config Command
Dell#show running-config
Current Configuration ...
! Version 9.10(0.0)
! Last configuration change at Sun Sep 6 12:41:09 2015 by default
!
boot system stack-unit 1 primary system: B:
boot system stack-unit 1 secondary system: A:
boot system stack-unit 1 default system: A:
boot system gateway 10.16.200.254
Managing the File System
The Dell Networking system can use the internal Flash, external Flash, or remote devices to store les.
The system stores les on the internal Flash by default but can be congured to store les elsewhere.
To view le system information, use the following command.
• View information about each le system.
EXEC Privilege mode
show file-systems
The output of the show file-systems command in the following example shows the total capacity, amount of free memory, le
structure, media type, read/write privileges for each storage device in use.
Dell#show file-systems
Size(b) Free(b) Feature Type Flags Prefixes
4286574592 4170424320 FAT32 USERFLASH rw flash:
- - unformatted USERFLASH rw fcmfs:
2032525312 590807040 Unknown NFSMOUNT rw nfsmount:
- - - network rw ftp:
- - - network rw tftp:
- - - network rw scp:
- - - network rw http:
You can change the default le system so that le management commands apply to a particular device or memory.
To change the default directory, use the following command.
• Change the default directory.
EXEC Privilege mode
cd directory
View Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes these
messages to a dedicated trace log buer.
The system generates a trace message for each executed command. No password information is saved to the le.
54
Getting Started










