White Papers

Table Of Contents
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 55
Allowing Access to CONFIGURATION Mode Commands................................................................................. 55
Allowing Access to Different Modes...................................................................................................................... 55
Applying a Privilege Level to a Username..............................................................................................................57
Applying a Privilege Level to a Terminal Line........................................................................................................57
Configuring Logging..........................................................................................................................................................57
Audit and Security Logs............................................................................................................................................. 57
Configuring Logging Format .............................................................................................................................59
Display the Logging Buffer and the Logging Configuration..............................................................................59
Setting Up a Secure Connection to a Syslog Server................................................................................ 60
Log Messages in the Internal Buffer............................................................................................................................. 61
Disabling System Logging................................................................................................................................................ 61
Sending System Messages to a Syslog Server.......................................................................................................... 62
Configuring a UNIX System as a Syslog Server...................................................................................................62
Track Login Activity..........................................................................................................................................................62
Restrictions for Tracking Login Activity................................................................................................................ 62
Configuring Login Activity Tracking........................................................................................................................62
Display Login Statistics.............................................................................................................................................. 63
Limit Concurrent Login Sessions...................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 64
Configuring Concurrent Session Limit................................................................................................................... 65
Enabling the System to Clear Existing Sessions..................................................................................................65
Enabling Secured CLI Mode........................................................................................................................................... 65
Changing System Logging Settings..............................................................................................................................66
Display the Logging Buffer and the Logging Configuration....................................................................................67
Configuring a UNIX Logging Facility Level..................................................................................................................67
Synchronizing Log Messages......................................................................................................................................... 68
Enabling Timestamp on Syslog Messages...................................................................................................................69
File Transfer Services........................................................................................................................................................71
Enabling the FTP Server............................................................................................................................................ 72
Configuring FTP Server Parameters.......................................................................................................................72
Configuring FTP Client Parameters........................................................................................................................ 72
Terminal Lines.....................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line............................................................................................. 73
Configuring Login Authentication for Terminal Lines..........................................................................................74
Setting Timeout for EXEC Privilege Mode..................................................................................................................75
Using Telnet to get to Another Network Device.......................................................................................................75
Lock CONFIGURATION Mode....................................................................................................................................... 76
Recovering from a Forgotten Password......................................................................................................................76
Recovering from a Forgotten Enable Password.................................................................................................. 77
Recovering from a Failed Start...................................................................................................................................... 78
Restoring the Factory Default Settings....................................................................................................................... 78
Restoring Factory Default Environment Variables.............................................................................................. 79
Dell EMC Networking OS Security Hardening........................................................................................................... 80
Dell EMC Networking OS Image Verification....................................................................................................... 80
Startup Configuration Verification...........................................................................................................................81
Configuring the root User Password...................................................................................................................... 82
Locking Access to GRUB Interface.........................................................................................................................82
Enabling User Lockout for Failed Login Attempts...............................................................................................83
4
Contents