Users Guide

Upgrading Dell Networking OS.........................................................................................................................................55
Using Hashes to Verify Software Images Before Installation.............................................................................................55
Using HTTP for File Transfers.......................................................................................................................................... 56
4 Management................................................................................................................. 57
Conguring Privilege Levels..............................................................................................................................................57
Creating a Custom Privilege Level.............................................................................................................................. 57
Removing a Command from EXEC Mode...................................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................ 57
Allowing Access to CONFIGURATION Mode Commands........................................................................................... 57
Allowing Access to Dierent Modes...........................................................................................................................58
Applying a Privilege Level to a Username................................................................................................................... 59
Applying a Privilege Level to a Terminal Line...............................................................................................................60
Conguring Logging......................................................................................................................................................... 60
Audit and Security Logs............................................................................................................................................. 60
Conguring Logging Format .....................................................................................................................................62
Display the Logging Buer and the Logging Conguration......................................................................................... 62
Setting Up a Secure Connection to a Syslog Server...................................................................................................63
Sending System Messages to a Syslog Server........................................................................................................... 64
Track Login Activity.......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................... 64
Conguring Login Activity Tracking............................................................................................................................ 64
Display Login Statistics...............................................................................................................................................65
Limit Concurrent Login Sessions...................................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions.................................................................................... 66
Conguring Concurrent Session Limit........................................................................................................................ 66
Enabling the System to Clear Existing Sessions......................................................................................................... 66
Log Messages in the Internal Buer................................................................................................................................. 67
Conguration Task List for System Log Management.................................................................................................67
Disabling System Logging................................................................................................................................................. 67
Sending System Messages to a Syslog Server................................................................................................................. 68
Conguring a UNIX System as a Syslog Server..........................................................................................................68
Changing System Logging Settings..................................................................................................................................68
Display the Logging Buer and the Logging Conguration............................................................................................... 69
Conguring a UNIX Logging Facility Level........................................................................................................................ 70
Synchronizing Log Messages............................................................................................................................................ 71
Enabling Timestamp on Syslog Messages......................................................................................................................... 71
File Transfer Services........................................................................................................................................................72
Conguration Task List for File Transfer Services........................................................................................................72
Enabling the FTP Server.............................................................................................................................................72
Conguring FTP Server Parameters........................................................................................................................... 72
Conguring FTP Client Parameters............................................................................................................................ 73
Terminal Lines...................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line......................................................................................................73
Conguring Login Authentication for Terminal Lines................................................................................................... 74
Setting Timeout for EXEC Privilege Mode........................................................................................................................75
4