White Papers

Table Of Contents
Removing a Command from EXEC Mode..............................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 57
Allowing Access to CONFIGURATION Mode Commands..................................................................................57
Allowing Access to Different Modes.......................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................. 59
Applying a Privilege Level to a Terminal Line....................................................................................................... 59
Configuring Logging......................................................................................................................................................... 59
Audit and Security Logs.............................................................................................................................................59
Configuring Logging Format ..............................................................................................................................61
Display the Logging Buffer and the Logging Configuration...............................................................................61
Setting Up a Secure Connection to a Syslog Server................................................................................ 62
Sending System Messages to a Syslog Server.................................................................................................... 63
Track Login Activity..........................................................................................................................................................63
Restrictions for Tracking Login Activity................................................................................................................ 63
Configuring Login Activity Tracking........................................................................................................................64
Display Login Statistics.............................................................................................................................................. 64
Limit Concurrent Login Sessions...................................................................................................................................65
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 66
Configuring Concurrent Session Limit................................................................................................................... 66
Enabling the System to Clear Existing Sessions..................................................................................................66
Enabling Secured CLI Mode............................................................................................................................................67
Log Messages in the Internal Buffer.............................................................................................................................67
Disabling System Logging................................................................................................................................................67
Sending System Messages to a Syslog Server.......................................................................................................... 68
Configuring a UNIX System as a Syslog Server...................................................................................................68
Changing System Logging Settings..............................................................................................................................68
Display the Logging Buffer and the Logging Configuration....................................................................................69
Configuring a UNIX Logging Facility Level..................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages....................................................................................................................71
File Transfer Services.......................................................................................................................................................73
Enabling the FTP Server............................................................................................................................................ 74
Configuring FTP Server Parameters.......................................................................................................................74
Configuring FTP Client Parameters........................................................................................................................ 74
Terminal Lines.................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line............................................................................................. 75
Configuring Login Authentication for Terminal Lines......................................................................................... 76
Setting Timeout for EXEC Privilege Mode.................................................................................................................. 77
Using Telnet to get to Another Network Device....................................................................................................... 77
Lock CONFIGURATION Mode........................................................................................................................................78
Recovering from a Forgotten Password......................................................................................................................79
Recovering from a Forgotten Enable Password.................................................................................................. 79
Recovering from a Failed Start......................................................................................................................................80
Restoring the Factory Default Settings.......................................................................................................................80
Restoring Factory Default Environment Variables............................................................................................... 81
Dell EMC Networking OS Security Hardening........................................................................................................... 82
Dell EMC Networking OS Image Verification........................................................................................................82
Startup Configuration Verification.......................................................................................................................... 83
Configuring the root User Password...................................................................................................................... 84
Locking Access to GRUB Interface........................................................................................................................ 85
4
Contents