Users Guide

Creating a Port-based VLAN..................................................................................................60
Assigning Interfaces to a VLAN..............................................................................................61
Assigning an IP Address to a VLAN....................................................................................... 61
Connect the S5000 to the Network.................................................................................... 62
Configure File Management.................................................................................................. 62
Copying Files to and from the System.................................................................................62
Important Points to Remember...................................................................................... 63
Mounting an NFS File System................................................................................................ 63
Important Points to Remember...................................................................................... 64
Saving the Running-Configuration.......................................................................................65
Viewing Files..............................................................................................................................66
View Configuration Files......................................................................................................... 67
Compressing Configuration Files..........................................................................................67
Managing the File System.......................................................................................................70
Enabling Software Features on Devices Using a Command Option............................. 71
View Command History.......................................................................................................... 72
Upgrading and Downgrading Dell Networking OS...........................................................73
Verify Software Images Before Installation......................................................................... 73
Using HTTP for File Transfers.................................................................................................74
4 Switch Management.............................................................................................................. 76
Configuring Privilege Levels...................................................................................................76
Creating a Custom Privilege Level.................................................................................. 76
Removing a Command from EXEC Mode.......................................................................... 76
Moving a Command from EXEC Privilege Mode to EXEC Mode................................... 77
Allowing Access to CONFIGURATION Mode Commands...............................................77
Allowing Access to the Following Modes............................................................................77
Applying a Privilege Level to a Username........................................................................... 79
Applying a Privilege Level to a Terminal Line..................................................................... 79
Configuring Logging............................................................................................................... 80
Log Messages in the Internal Buffer.....................................................................................80
Configuration Task List for System Log Management............................................... 80
Disabling System Logging.................................................................................................81
Sending System Messages to a Syslog Server.............................................................. 81
Configuring a UNIX System as a Syslog Server.................................................................. 81
Track Login Activity..................................................................................................................82
Restrictions for Tracking Login Activity......................................................................... 82
Configuring Login Activity Tracking............................................................................... 82
Display Login Statistics...................................................................................................... 83
Limit Concurrent Login Sessions..........................................................................................84
Restrictions for Limiting the Number of Concurrent Sessions.................................85
Configuring Concurrent Session Limit.......................................................................... 85
4