Deployment Guide

Entering CLI commands Using an SSH Connection..............................................................................................49
Executing Local CLI Scripts Using an SSH Connection........................................................................................49
Boot Process....................................................................................................................................................................50
Default Conguration....................................................................................................................................................... 51
Conguring a Host Name................................................................................................................................................ 51
Conguring a Unique Host Name on the System........................................................................................................52
Accessing the System Remotely....................................................................................................................................52
Accessing the Switch Remotely...............................................................................................................................52
Congure the Management Port IP Address......................................................................................................... 52
Congure a Management Route..............................................................................................................................53
Conguring a Username and Password.................................................................................................................. 53
Conguring the Enable Password..................................................................................................................................53
Conguration File Management.....................................................................................................................................54
Copy Files to and from the System......................................................................................................................... 54
Save the Running-Conguration............................................................................................................................. 55
Viewing Files...............................................................................................................................................................56
Managing the File System...............................................................................................................................................57
View the Command History........................................................................................................................................... 58
Using HTTP for File Transfers........................................................................................................................................ 58
Upgrading and Downgrading the Dell Networking OS................................................................................................59
Verify Software Images Before Installation...................................................................................................................59
Deploying FN I/O Module............................................................................................................................................... 60
Ensuring the FN IOM system is in Standalone Mode.............................................................................................61
Conguration Examples............................................................................................................................................. 61
Congure Interfaces and Port Channel...................................................................................................................63
Verifying the Congurations.....................................................................................................................................64
5 Management............................................................................................................................................... 65
Conguring Privilege Levels........................................................................................................................................... 65
Creating a Custom Privilege Level...........................................................................................................................66
Customizing a Privilege Level...................................................................................................................................66
Applying a Privilege Level to a Username...............................................................................................................68
Applying a Privilege Level to a Terminal Line.......................................................................................................... 68
Conguring Logging........................................................................................................................................................ 68
Audit and Security Logs............................................................................................................................................ 69
Conguring Logging Format ...................................................................................................................................70
Setting Up a Secure Connection to a Syslog Server..............................................................................................71
Display the Logging Buer and the Logging Conguration........................................................................................ 72
Log Messages in the Internal Buer..............................................................................................................................72
Conguration Task List for System Log Management.......................................................................................... 73
Disabling System Logging............................................................................................................................................... 73
Sending System Messages to a Syslog Server............................................................................................................ 73
Conguring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings............................................................................................................................... 74
Display the Logging Buer and the Logging Conguration........................................................................................75
Conguring a UNIX Logging Facility Level....................................................................................................................75
4
Contents