Users Guide

Changes in Configuration Files
Configuration files have three commented lines at the beginning of the file, as shown in the following example, to help you
track the last time any user made a change to the file, which user made the changes, and when the file was last saved to the
startup-configuration.
In the running-configuration file, if there is a difference between the timestamp on the “Last configuration change,” and
“Startup-config last updated,” you have made changes that have not been saved and will not be preserved after a system
reboot.
Example of the show running-config Command
Dell#show running-config
Current Configuration ...
! Version 1-0(0-4013)
! Last configuration change at Wed Jun 3 16:24:25 2015 by admin
!
boot system rpm0 primary system: A:
boot system rpm0 secondary tftp://10.16.127.35/DT-MAA-C9000-3
boot system rpm0 default system: A:
boot system rpm1 primary system: A:
boot system rpm1 secondary tftp://10.16.127.35/DT-MAA-C9000-3
boot system rpm1 default system: A:
boot system gateway 10.16.127.148
!
service timestamps log datetime
!
logging coredump
!
hostname Dell
!
Viewing Command History
The command-history trace feature captures all commands entered by all users of the system with a time stamp and writes
these messages to a dedicated trace log buffer.
The system generates a trace message for each executed command. No password information is saved to the file.
To view the command-history trace, use the show command-history command.
Example of the show command-history Command
Dell#show command-history
[12/5 10:57:8]: CMD-(CLI):service password-encryption
[12/5 10:57:12]: CMD-(CLI):hostname Force10
[12/5 10:57:12]: CMD-(CLI):ip telnet server enable
[12/5 10:57:12]: CMD-(CLI):line console 0
[12/5 10:57:12]: CMD-(CLI):line vty 0 9
Upgrading the Dell Networking OS
To upgrade the Dell Networking operating system on the switch, refer to the Release Notes for the software version you want
to load.
For information about how to verify newly copied or currently running software images, see:
Using Hashes to Validate Software Images
Using Hashes to Validate Software Images
Using Hashes to Validate Software Images
Getting Started 53