Service Manual

Creating a Port-based VLAN.................................................................................................. 61
Assigning Interfaces to a VLAN..............................................................................................62
Assigning an IP Address to a VLAN....................................................................................... 62
Connect the S5000 to the Network.................................................................................... 63
Configure File Management.................................................................................................. 63
Copying Files to and from the System.................................................................................63
Important Points to Remember...................................................................................... 64
Mounting an NFS File System................................................................................................ 64
Important Points to Remember.......................................................................................65
Saving the Running-Configuration.......................................................................................66
Viewing Files.............................................................................................................................. 67
View Configuration Files.........................................................................................................68
Compressing Configuration Files......................................................................................... 68
Managing the File System........................................................................................................71
Enabling Software Features on Devices Using a Command Option.............................72
View Command History.......................................................................................................... 73
Upgrading and Downgrading Dell Networking OS...........................................................74
Verify Software Images Before Installation......................................................................... 74
Using HTTP for File Transfers.................................................................................................75
4 Switch Management.............................................................................................................. 77
Configuring Privilege Levels................................................................................................... 77
Creating a Custom Privilege Level.................................................................................. 77
Removing a Command from EXEC Mode...........................................................................77
Moving a Command from EXEC Privilege Mode to EXEC Mode................................... 78
Allowing Access to CONFIGURATION Mode Commands.............................................. 78
Allowing Access to the Following Modes........................................................................... 78
Applying a Privilege Level to a Username...........................................................................80
Applying a Privilege Level to a Terminal Line.....................................................................80
Configuring Logging................................................................................................................81
Log Messages in the Internal Buffer..................................................................................... 81
Configuration Task List for System Log Management................................................81
Disabling System Logging................................................................................................ 82
Sending System Messages to a Syslog Server..............................................................82
Configuring a UNIX System as a Syslog Server..................................................................82
Track Login Activity..................................................................................................................83
Restrictions for Tracking Login Activity......................................................................... 83
Configuring Login Activity Tracking............................................................................... 83
Display Login Statistics......................................................................................................84
Limit Concurrent Login Sessions.......................................................................................... 85
Restrictions for Limiting the Number of Concurrent Sessions.................................86
Configuring Concurrent Session Limit.......................................................................... 86
4