White Papers

Table Of Contents
Configuring a Username and Password................................................................................................................. 49
Configuring the Enable Password................................................................................................................................. 50
Configuration File Management.................................................................................................................................... 50
Copy Files to and from the System........................................................................................................................ 50
Save the Running-Configuration.............................................................................................................................. 51
Viewing Files................................................................................................................................................................. 52
Managing the File System...............................................................................................................................................53
View the Command History............................................................................................................................................54
Using HTTP for File Transfers....................................................................................................................................... 55
Upgrading and Downgrading the Dell Networking OS............................................................................................. 56
Verify Software Images Before Installation................................................................................................................ 56
Deploying FN I/O Module................................................................................................................................................57
Ensuring the FN IOM system is in Standalone Mode......................................................................................... 58
Configuration Examples............................................................................................................................................. 58
Configure Interfaces and Port Channel................................................................................................................. 60
Verifying the Configurations.....................................................................................................................................60
Chapter 5: Management.............................................................................................................. 62
Configuring Privilege Levels........................................................................................................................................... 62
Creating a Custom Privilege Level.......................................................................................................................... 62
Customizing a Privilege Level...................................................................................................................................63
Applying a Privilege Level to a Username..............................................................................................................64
Applying a Privilege Level to a Terminal Line....................................................................................................... 65
Configuring Logging......................................................................................................................................................... 65
Audit and Security Logs.............................................................................................................................................65
Configuring Logging Format ............................................................................................................................. 67
Setting Up a Secure Connection to a Syslog Server.................................................................................67
Display the Logging Buffer and the Logging Configuration....................................................................................69
Log Messages in the Internal Buffer............................................................................................................................ 69
Disabling System Logging................................................................................................................................................70
Sending System Messages to a Syslog Server.......................................................................................................... 70
Configuring a UNIX System as a Syslog Server...................................................................................................70
Changing System Logging Settings..............................................................................................................................70
Display the Logging Buffer and the Logging Configuration.....................................................................................71
Configuring a UNIX Logging Facility Level.................................................................................................................. 72
Synchronizing Log Messages......................................................................................................................................... 73
Enabling Timestamp on Syslog Messages................................................................................................................... 73
Enabling Secure Management Mode............................................................................................................................ 73
Enabling Secured CLI Mode............................................................................................................................................74
File Transfer Services.......................................................................................................................................................74
Enabling the FTP Server............................................................................................................................................ 74
Configuring FTP Server Parameters.......................................................................................................................75
Configuring FTP Client Parameters........................................................................................................................ 75
Terminal Lines.................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line............................................................................................. 76
Configuring Login Authentication for Terminal Lines......................................................................................... 76
Setting Time Out of EXEC Privilege Mode..................................................................................................................77
Using Telnet to get to Another Network Device....................................................................................................... 77
Lock CONFIGURATION Mode........................................................................................................................................78
Limit Concurrent Login Sessions................................................................................................................................... 79
4
Contents