Service Manual

Table Of Contents
Managing the File System...................................................................................................................60
Enabling Software Features on Devices Using a Command Option.................................................61
View Command History......................................................................................................................62
Upgrading Dell Networking OS.......................................................................................................... 62
Using Hashes to Verify Software Images Before Installation............................................................ 62
Using HTTP for File Transfers............................................................................................................. 63
4 Management........................................................................................................65
Configuring Privilege Levels............................................................................................................... 65
Creating a Custom Privilege Level................................................................................................65
Removing a Command from EXEC Mode................................................................................... 65
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................66
Allowing Access to CONFIGURATION Mode Commands..........................................................66
Allowing Access to Different Modes............................................................................................ 66
Applying a Privilege Level to a Username.................................................................................... 68
Applying a Privilege Level to a Terminal Line...............................................................................68
Configuring Logging...........................................................................................................................68
Audit and Security Logs................................................................................................................ 69
Configuring Logging Format .......................................................................................................71
Display the Logging Buffer and the Logging Configuration........................................................ 71
Setting Up a Secure Connection to a Syslog Server.................................................................... 72
Sending System Messages to a Syslog Server.............................................................................. 73
Track Login Activity............................................................................................................................. 73
Restrictions for Tracking Login Activity........................................................................................ 73
Configuring Login Activity Tracking............................................................................................. 73
Display Login Statistics..................................................................................................................74
Limit Concurrent Login Sessions........................................................................................................75
Restrictions for Limiting the Number of Concurrent Sessions....................................................75
Configuring Concurrent Session Limit......................................................................................... 75
Enabling the System to Clear Existing Sessions...........................................................................76
Log Messages in the Internal Buffer................................................................................................... 76
Configuration Task List for System Log Management.................................................................77
Disabling System Logging................................................................................................................... 77
Sending System Messages to a Syslog Server.................................................................................... 77
Configuring a UNIX System as a Syslog Server............................................................................ 77
Changing System Logging Settings....................................................................................................78
Display the Logging Buffer and the Logging Configuration..............................................................79
Configuring a UNIX Logging Facility Level.........................................................................................79
Synchronizing Log Messages..............................................................................................................81
Enabling Timestamp on Syslog Messages..........................................................................................81
File Transfer Services...........................................................................................................................82
Configuration Task List for File Transfer Services........................................................................82
4