Setup Guide

Table Of Contents
1 About this Guide......................................................................................................................... 32
Audience............................................................................................................................................................................... 32
Conventions......................................................................................................................................................................... 32
Related Documents.............................................................................................................................................................32
2 Configuration Fundamentals....................................................................................................... 33
Accessing the Command Line............................................................................................................................................33
CLI Modes............................................................................................................................................................................ 33
Navigating CLI Modes...................................................................................................................................................35
The do Command................................................................................................................................................................ 37
Undoing Commands............................................................................................................................................................38
Obtaining Help..................................................................................................................................................................... 38
Entering and Editing Commands....................................................................................................................................... 38
Command History................................................................................................................................................................39
Filtering show Command Outputs.................................................................................................................................... 39
Multiple Users in Configuration Mode.............................................................................................................................. 40
Configuring alias command................................................................................................................................................. 41
Viewing alias configuration............................................................................................................................................41
3 Getting Started..........................................................................................................................43
Console Access....................................................................................................................................................................43
Serial Console.................................................................................................................................................................43
Micro USB-B Access.....................................................................................................................................................44
Default Configuration..........................................................................................................................................................45
Configuring a Host Name...................................................................................................................................................45
Accessing the System Remotely.......................................................................................................................................45
Configure the Management Port IP Address............................................................................................................ 45
Configure a Management Route................................................................................................................................. 46
Configuring a Username and Password......................................................................................................................46
Configuring the Enable Password..................................................................................................................................... 46
Configuration File Management.........................................................................................................................................47
Copy Files to and from the System.............................................................................................................................47
Mounting an NFS File System..................................................................................................................................... 48
Save the Running-Configuration................................................................................................................................. 49
Configure the Overload Bit for a Startup Scenario...................................................................................................50
Viewing Files...................................................................................................................................................................50
Managing the File System...................................................................................................................................................51
View Command History.......................................................................................................................................................51
Upgrading Dell EMC Networking OS.................................................................................................................................51
Using HTTP for File Transfers............................................................................................................................................51
Verify Software Images Before Installation......................................................................................................................52
4 Management..............................................................................................................................54
Configuring Privilege Levels...............................................................................................................................................54
Contents
Contents 3