Users Guide
Upgrading Dell Networking OS...................................................................................................................................... 57
Verify Software Images Before Installation.................................................................................................................. 57
Using HTTP for File Transfers....................................................................................................................................... 58
4 Management............................................................................................................................................... 60
Configuring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level.......................................................................................................................... 60
Removing a Command from EXEC Mode...............................................................................................................61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 61
Allowing Access to Different Modes........................................................................................................................61
Applying a Privilege Level to a Username...............................................................................................................63
Applying a Privilege Level to a Terminal Line......................................................................................................... 63
Configuring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................64
Configuring Logging Format .................................................................................................................................. 65
Display the Logging Buffer and the Logging Configuration................................................................................. 66
Setting Up a Secure Connection to a Syslog Server............................................................................................ 66
Sending System Messages to a Syslog Server......................................................................................................68
Track Login Activity.........................................................................................................................................................68
Restrictions for Tracking Login Activity..................................................................................................................68
Configuring Login Activity Tracking........................................................................................................................ 68
Display Login Statistics............................................................................................................................................. 69
Limit Concurrent Login Sessions................................................................................................................................... 70
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 70
Configuring Concurrent Session Limit.................................................................................................................... 70
Enabling the System to Clear Existing Sessions.....................................................................................................71
Enabling Secured CLI Mode........................................................................................................................................... 72
Log Messages in the Internal Buffer............................................................................................................................. 72
Configuration Task List for System Log Management......................................................................................... 72
Disabling System Logging............................................................................................................................................... 72
Sending System Messages to a Syslog Server............................................................................................................73
Configuring a UNIX System as a Syslog Server.....................................................................................................73
Changing System Logging Settings.............................................................................................................................. 73
Display the Logging Buffer and the Logging Configuration....................................................................................... 74
Configuring a UNIX Logging Facility Level................................................................................................................... 75
Synchronizing Log Messages.........................................................................................................................................76
Enabling Timestamp on Syslog Messages....................................................................................................................76
File Transfer Services...................................................................................................................................................... 77
Configuration Task List for File Transfer Services.................................................................................................77
Enabling the FTP Server........................................................................................................................................... 77
Configuring FTP Server Parameters....................................................................................................................... 77
Configuring FTP Client Parameters.........................................................................................................................78
Terminal Lines...................................................................................................................................................................78
Denying and Permitting Access to a Terminal Line............................................................................................... 79
Configuring Login Authentication for Terminal Lines............................................................................................80
4
Contents