Concept Guide

Entering CLI commands Using an SSH Connection..............................................................................................50
Executing Local CLI Scripts Using an SSH Connection........................................................................................50
Boot Process.....................................................................................................................................................................51
Default Conguration...................................................................................................................................................... 52
Conguring a Host Name............................................................................................................................................... 52
Conguring a Unique Host Name on the System........................................................................................................53
Accessing the System Remotely....................................................................................................................................53
Accessing the Switch Remotely...............................................................................................................................53
Congure the Management Port IP Address......................................................................................................... 53
Congure a Management Route..............................................................................................................................54
Conguring a Username and Password.................................................................................................................. 54
Conguring the Enable Password..................................................................................................................................55
Conguration File Management.....................................................................................................................................55
Copy Files to and from the System......................................................................................................................... 56
Save the Running-Conguration..............................................................................................................................57
Viewing Files...............................................................................................................................................................58
Managing the File System.............................................................................................................................................. 59
View the Command History........................................................................................................................................... 60
Using HTTP for File Transfers.........................................................................................................................................61
Upgrading and Downgrading the Dell Networking OS................................................................................................62
Verify Software Images Before Installation...................................................................................................................62
Deploying FN I/O Module............................................................................................................................................... 63
Ensuring the FN IOM system is in Standalone Mode............................................................................................64
Conguration Examples............................................................................................................................................ 64
Congure Interfaces and Port Channel...................................................................................................................66
Verifying the Congurations.....................................................................................................................................66
5 Management............................................................................................................................................... 68
Conguring Privilege Levels............................................................................................................................................68
Creating a Custom Privilege Level...........................................................................................................................68
Customizing a Privilege Level...................................................................................................................................69
Applying a Privilege Level to a Username................................................................................................................71
Applying a Privilege Level to a Terminal Line........................................................................................................... 71
Conguring Logging......................................................................................................................................................... 71
Audit and Security Logs............................................................................................................................................ 72
Conguring Logging Format ...................................................................................................................................73
Setting Up a Secure Connection to a Syslog Server.............................................................................................73
Display the Logging Buer and the Logging Conguration........................................................................................75
Log Messages in the Internal Buer..............................................................................................................................75
Conguration Task List for System Log Management.......................................................................................... 75
Disabling System Logging............................................................................................................................................... 76
Sending System Messages to a Syslog Server............................................................................................................ 76
Conguring a UNIX System as a Syslog Server.....................................................................................................76
Changing System Logging Settings...............................................................................................................................76
Display the Logging Buer and the Logging Conguration........................................................................................ 77
Conguring a UNIX Logging Facility Level....................................................................................................................78
4
Contents