White Papers

Table Of Contents
Viewing Files.......................................................................................................................................................................53
View Configuration Files..................................................................................................................................................54
Compressing Configuration Files...................................................................................................................................54
Managing the File System...............................................................................................................................................56
Enabling Software Features on Devices Using a Command Option..................................................................... 57
View Command History................................................................................................................................................... 58
Upgrading and Downgrading Dell Networking OS.................................................................................................... 58
Verify Software Images Before Installation................................................................................................................ 58
Using HTTP for File Transfers....................................................................................................................................... 59
Chapter 4: Switch Management................................................................................................... 61
Configuring Privilege Levels............................................................................................................................................ 61
Removing a Command from EXEC Mode................................................................................................................... 62
Moving a Command from EXEC Privilege Mode to EXEC Mode.......................................................................... 62
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 62
Allowing Access to the Following Modes.................................................................................................................... 62
Applying a Privilege Level to a Username................................................................................................................... 64
Applying a Privilege Level to a Terminal Line............................................................................................................. 64
Configuring Logging......................................................................................................................................................... 64
Log Messages in the Internal Buffer............................................................................................................................ 65
Disabling System Logging..........................................................................................................................................65
Sending System Messages to a Syslog Server.................................................................................................... 65
Configuring a UNIX System as a Syslog Server........................................................................................................ 65
Track Login Activity..........................................................................................................................................................66
Restrictions for Tracking Login Activity................................................................................................................ 66
Configuring Login Activity Tracking........................................................................................................................66
Display Login Statistics.............................................................................................................................................. 66
Limit Concurrent Login Sessions................................................................................................................................... 68
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 68
Configuring Concurrent Session Limit....................................................................................................................68
Enabling the System to Clear Existing Sessions..................................................................................................68
Enabling Secured CLI Mode........................................................................................................................................... 69
Changing System Logging Settings..............................................................................................................................69
Display the Logging Buffer and the Logging Configuration....................................................................................70
Configuring a UNIX Logging Facility Level...................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages................................................................................................................... 72
File Transfer Services.......................................................................................................................................................72
Enabling the FTP Server............................................................................................................................................ 73
Configuring FTP Server Parameters.......................................................................................................................73
Configuring FTP Client Parameters........................................................................................................................ 73
Terminal Lines.....................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................. 74
Configuring Login Authentication for Terminal Lines............................................................................................... 75
Setting Time Out of EXEC Privilege Mode................................................................................................................. 75
Using Telnet to get to Another Network Device....................................................................................................... 76
Lock CONFIGURATION Mode....................................................................................................................................... 76
View the Configuration Lock Status............................................................................................................................. 77
Recovering from a Forgotten Password......................................................................................................................77
Recovering from a Forgotten Enable Password........................................................................................................ 78
4
Contents