Users Guide
Upgrading Dell Networking OS......................................................................................................................................58
Verify Software Images Before Installation..................................................................................................................58
Using HTTP for File Transfers....................................................................................................................................... 59
4 Management................................................................................................................................................ 61
Configuring Privilege Levels............................................................................................................................................61
Creating a Custom Privilege Level........................................................................................................................... 61
Removing a Command from EXEC Mode..............................................................................................................62
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 62
Allowing Access to CONFIGURATION Mode Commands................................................................................... 62
Allowing Access to Different Modes.......................................................................................................................62
Applying a Privilege Level to a Username...............................................................................................................64
Applying a Privilege Level to a Terminal Line......................................................................................................... 64
Configuring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Configuring Logging Format .................................................................................................................................. 66
Display the Logging Buffer and the Logging Configuration................................................................................. 67
Setting Up a Secure Connection to a Syslog Server............................................................................................ 67
Sending System Messages to a Syslog Server......................................................................................................69
Track Login Activity.........................................................................................................................................................69
Restrictions for Tracking Login Activity..................................................................................................................69
Configuring Login Activity Tracking........................................................................................................................ 69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.................................................................................................................................... 71
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................71
Configuring Concurrent Session Limit..................................................................................................................... 71
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode........................................................................................................................................... 73
Log Messages in the Internal Buffer............................................................................................................................. 73
Configuration Task List for System Log Management......................................................................................... 73
Disabling System Logging............................................................................................................................................... 73
Sending System Messages to a Syslog Server............................................................................................................74
Configuring a UNIX System as a Syslog Server.....................................................................................................74
Changing System Logging Settings.............................................................................................................................. 74
Display the Logging Buffer and the Logging Configuration....................................................................................... 75
Configuring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services......................................................................................................................................................78
Configuration Task List for File Transfer Services.................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Configuring FTP Server Parameters....................................................................................................................... 78
Configuring FTP Client Parameters.........................................................................................................................79
Terminal Lines...................................................................................................................................................................79
Denying and Permitting Access to a Terminal Line...............................................................................................80
Configuring Login Authentication for Terminal Lines.............................................................................................81
4
Contents