Administrator Guide

Chapter 1: About this Guide.........................................................................................................30
Audience.............................................................................................................................................................................. 30
Conventions........................................................................................................................................................................30
Related Documents...........................................................................................................................................................30
Chapter 2: Configuration Fundamentals.......................................................................................31
Accessing the Command Line......................................................................................................................................... 31
CLI Modes............................................................................................................................................................................31
Navigating CLI Modes................................................................................................................................................ 33
The do Command.............................................................................................................................................................. 35
Undoing Commands..........................................................................................................................................................36
Obtaining Help....................................................................................................................................................................36
Entering and Editing Commands....................................................................................................................................37
Command History..............................................................................................................................................................38
Filtering show Command Outputs.................................................................................................................................38
Multiple Users in Configuration Mode..........................................................................................................................39
Chapter 3: Getting Started..........................................................................................................40
Console Access..................................................................................................................................................................40
Serial Console...............................................................................................................................................................40
Accessing the CLI Interface and Running Scripts Using SSH.................................................................................41
Default Configuration....................................................................................................................................................... 42
Configuring a Host Name................................................................................................................................................ 42
Accessing the System Remotely................................................................................................................................... 42
Configure the Management Port IP Address........................................................................................................43
Configure a Management Route..............................................................................................................................43
Configuring a Username and Password................................................................................................................. 43
Configuring the Enable Password................................................................................................................................. 44
Configuration File Management.....................................................................................................................................45
Copy Files to and from the System........................................................................................................................ 45
Mounting an NFS File System..................................................................................................................................45
Save the Running-Configuration..............................................................................................................................47
Configure the Overload Bit for a Startup Scenario.............................................................................................47
Viewing Files................................................................................................................................................................. 47
Compressing Configuration Files............................................................................................................................. 48
Managing the File System...............................................................................................................................................50
Enabling Software Features on Devices Using a Command Option......................................................................51
View Command History.................................................................................................................................................... 51
Upgrading Dell EMC Networking OS............................................................................................................................53
Verify Software Images Before Installation................................................................................................................ 53
Using HTTP for File Transfers....................................................................................................................................... 54
Chapter 4: Management.............................................................................................................. 55
Configuring Privilege Levels........................................................................................................................................... 55
Contents
Contents 3