Administrator Guide

3
Conguration Fundamentals
The Dell Networking Operating System (OS) command line interface (CLI) is a text-based interface you can use to congure
interfaces and protocols.
The CLI is structured in modes for security and management purposes. Dierent sets of commands are available in each mode, and
you can limit user access to modes using privilege levels.
In Dell Networking OS, after you enable a command, it is entered into the running conguration le. You can view the current
conguration for the whole system or for a particular CLI mode. To save the current conguration, copy the running conguration to
another location. For more information, refer to Save the Running-Conguration.
NOTE: You can use the chassis management controller (CMC) out-of-band management interface to access and manage
an Aggregator using the Dell Networking OS command-line reference. For more information about how to access the
CMC to congure an Aggregator, refer to the Dell Chassis Management Controller (CMC) User’s Guide on the Dell
Support website at
http://support.dell.com/support/edocs/systems/pem/en/index.htm
.
Accessing the Command Line
Access the command line through a serial console port or a Telnet session (Logging into the System using Telnet). When the system
successfully boots, enter the command line in EXEC mode.
Logging into the System using Telnet
telnet 172.31.1.53
Trying 172.31.1.53...
Connected to 172.31.1.53.
Escape character is '^]'.
Login: username
Password:
Dell>
CLI Modes
Dierent sets of commands are available in each mode.
A command found in one mode cannot be executed from another mode (except for EXEC mode commands with a preceding do
command (refer to the do Command section).
The Dell Networking OS CLI is divided into three major mode levels:
EXEC mode is the default mode and has a privilege level of 1, which is the most restricted level. Only a limited selection of
commands is available, notably the show commands, which allow you to view system information.
EXEC Privilege mode has commands to view congurations, clear counters, manage conguration les, run diagnostics, and
enable or disable debug operations. The privilege level is 15, which is unrestricted. You can congure a password for this mode.
CONFIGURATION mode allows you to congure security features, time settings, set logging and SNMP functions, congure
static ARP and MAC addresses, and set line cards on the system.
Beneath CONFIGURATION mode are submodes that apply to interfaces, protocols, and features. The following example shows the
submode command structure. Two sub-CONFIGURATION modes are important when conguring the chassis for the rst time:
INTERFACE submode is the mode in which you congure Layer 2 protocols and IP services specic to an interface. An interface
can be physical (10 Gigabit Ethernet) or logical (Null, port channel, or virtual local area network [VLAN]).
20
Conguration Fundamentals