Users Guide

View Conguration Files
Conguration les have three commented lines at the beginning of the le, as shown in the following example, to help you track the last
time any user made a change to the le, which user made the changes, and when the le was last saved to the startup-conguration.
In the running-conguration le, if there is a dierence between the timestamp on the “Last conguration change” and “Startup-cong last
updated,” you have made changes that have not been saved and are preserved after a system reboot.
Example of the show running-config Command
Dell#show running-config
Current Configuration ...
! Version 9.10(0.0)
! Last configuration change at Sun Sep 6 12:41:09 2015 by default
!
boot system stack-unit 1 primary system: B:
boot system stack-unit 1 secondary system: A:
boot system stack-unit 1 default system: A:
boot system gateway 10.16.200.254
Managing the File System
The Dell Networking system can use the internal Flash, external Flash, or remote devices to store les.
The system stores les on the internal Flash by default but can be congured to store les elsewhere.
To view le system information, use the following command.
View information about each le system.
EXEC Privilege mode
show file-systems
The output of the show file-systems command in the following example shows the total capacity, amount of free memory, le
structure, media type, read/write privileges for each storage device in use.
Dell#show file-systems
Size(b) Free(b) Feature Type Flags Prefixes
4286574592 4170424320 FAT32 USERFLASH rw flash:
- - unformatted USERFLASH rw fcmfs:
2032525312 590807040 Unknown NFSMOUNT rw nfsmount:
- - - network rw ftp:
- - - network rw tftp:
- - - network rw scp:
- - - network rw http:
You can change the default le system so that le management commands apply to a particular device or memory.
To change the default directory, use the following command.
Change the default directory.
EXEC Privilege mode
cd directory
View Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes these
messages to a dedicated trace log buer.
The system generates a trace message for each executed command. No password information is saved to the le.
52
Getting Started