Dell Configuration Guide for the S60 System 8.3.3.10 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Information in this publication is subject to change without notice. © 2014 Dell Force10. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell™, the Dell logo, Dell Boomi™, Dell Precision™ , OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of Intel Corporation in the U.S. and other countries. AMD®is a registered trademark and AMD Opteron™, AMD Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat®Enterprise Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®, vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other countries. IBM® is a registered trademark of International Business Machines Corporation. Other trademarks and trade names may be used in this publication to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. November 2014 3 About this Guide . 23 Objectives . .23 Audience . .23 Conventions . .24 Information Symbols . .24 Related Documents . .24 4 Configuration Fundamentals . 25 Accessing the Command Line . .25 CLI Modes . .26 Navigating CLI Modes . .27 The do Command . .30 Undoing Commands . .30 Obtaining Help . .31 Entering and Editing Commands . .31 Command History . .32 Filtering show Command Outputs . .33 Multiple Users in Configuration mode . .34 5 Getting Started . 35 Console access . .35 Serial console . .36 USB-B console . .37 Default Configuration . .38 Configure a Host Name . .39 Accessing the System Remotely . .39 Accessing the C-Series and E-Series and the S60 Remotely . .39 Access the S-Series Remotely . .41 Configure the Enable Password . .42 Configuration File Management . .42 Copy Files to and from the System . .43 Save the Running-configuration . .44 View Files . .45 File System Management . .47 View command history . .48 Upgrading and Downgrading FTOS . .48 6 Management . 49 Configure Privilege Levels . .49 Create a Custom Privilege Level . .49 Apply a Privilege Level to a Username . .53 Apply a Privilege Level to a Terminal Line . .53 | 3 Configure Logging . .53 Log Messages in the Internal Buffer . .54 Configuration Task List for System Log Management . .54 Disable System Logging . .54 Send System Messages to a Syslog Server . .55 Configure a Unix System as a Syslog Server . .55 Change System Logging Settings . .55 Display the Logging Buffer and the Logging Configuration . .56 Configure a UNIX logging facility level . .58 Synchronize log messages . .59 Enable timestamp on syslog messages . .59 File Transfer Services . .60 www.dell.com | dell.com/support Configuration Task List for File Transfer Services . .60 Terminal Lines . .62 Deny and Permit Access to a Terminal Line . .62 Configure Login Authentication for Terminal Lines . .63 Time out of EXEC Privilege Mode . .64 Telnet to Another Network Device . .65 Lock CONFIGURATION mode . .66 Viewing the Configuration Lock Status . .67 Recovering from a Forgotten Password on the S60 . .67 Recovering from a Forgotten Enable Password on the S60 . .68 Recovering from a Failed Start on the S60 . .69 7 802.1ag . 71 Ethernet CFM . .71 Maintenance Domains . .72 Maintenance Points . .72 Maintenance End Points . .73 Implementation Information . ..
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages854 Page
-
File Size-