Setup Guide

Upgrading Dell EMC Networking OS............................................................................................................................ 63
Verify Software Images Before Installation...................................................................................................................63
Using HTTP for File Transfers........................................................................................................................................ 64
4 Management............................................................................................................................................... 66
Conguring Privilege Levels........................................................................................................................................... 66
Creating a Custom Privilege Level........................................................................................................................... 67
Removing a Command from EXEC Mode.............................................................................................................. 67
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................67
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 67
Allowing Access to Dierent Modes........................................................................................................................67
Applying a Privilege Level to a Username............................................................................................................... 69
Applying a Privilege Level to a Terminal Line.......................................................................................................... 69
Conguring Logging........................................................................................................................................................ 69
Audit and Security Logs............................................................................................................................................ 70
Conguring Logging Format ...................................................................................................................................72
Display the Logging Buer and the Logging Conguration.................................................................................. 72
Setting Up a Secure Connection to a Syslog Server.............................................................................................73
Sending System Messages to a Syslog Server...................................................................................................... 74
Track Login Activity..........................................................................................................................................................74
Restrictions for Tracking Login Activity...................................................................................................................74
Conguring Login Activity Tracking..........................................................................................................................74
Display Login Statistics..............................................................................................................................................75
Limit Concurrent Login Sessions....................................................................................................................................76
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................76
Conguring Concurrent Session Limit.....................................................................................................................77
Enabling the System to Clear Existing Sessions.....................................................................................................77
Enabling Secured CLI Mode............................................................................................................................................78
Log Messages in the Internal Buer..............................................................................................................................78
Conguration Task List for System Log Management.......................................................................................... 78
Disabling System Logging............................................................................................................................................... 78
Sending System Messages to a Syslog Server............................................................................................................ 79
Conguring a UNIX System as a Syslog Server.....................................................................................................79
Changing System Logging Settings...............................................................................................................................79
Display the Logging Buer and the Logging Conguration........................................................................................80
Conguring a UNIX Logging Facility Level.....................................................................................................................81
Synchronizing Log Messages......................................................................................................................................... 82
Enabling Timestamp on Syslog Messages....................................................................................................................82
File Transfer Services...................................................................................................................................................... 85
Conguration Task List for File Transfer Services..................................................................................................85
Enabling the FTP Server...........................................................................................................................................85
Conguring FTP Server Parameters....................................................................................................................... 86
Conguring FTP Client Parameters.........................................................................................................................86
Terminal Lines................................................................................................................................................................... 87
Denying and Permitting Access to a Terminal Line................................................................................................ 87
Conguring Login Authentication for Terminal Lines.............................................................................................88
4
Contents