Administrator Guide

Congure File Management........................................................................................................................................... 54
Copying Files to and from the System.......................................................................................................................... 54
Important Points to Remember............................................................................................................................... 55
Mounting an NFS File System........................................................................................................................................55
Important Points to Remember................................................................................................................................56
Saving the Running-Conguration.................................................................................................................................57
Viewing Files..................................................................................................................................................................... 57
View Conguration Files................................................................................................................................................. 58
Compressing Conguration Files................................................................................................................................... 59
Managing the File System.............................................................................................................................................. 62
Enabling Software Features on Devices Using a Command Option..........................................................................62
View Command History.................................................................................................................................................. 63
Upgrading and Downgrading Dell Networking OS.......................................................................................................63
Verify Software Images Before Installation...................................................................................................................63
Using HTTP for File Transfers........................................................................................................................................ 64
4 Switch Management....................................................................................................................................66
Conguring Privilege Levels........................................................................................................................................... 66
Creating a Custom Privilege Level...........................................................................................................................66
Removing a Command from EXEC Mode.................................................................................................................... 66
Moving a Command from EXEC Privilege Mode to EXEC Mode..............................................................................66
Allowing Access to CONFIGURATION Mode Commands.......................................................................................... 67
Allowing Access to the Following Modes......................................................................................................................67
Applying a Privilege Level to a Username.....................................................................................................................68
Applying a Privilege Level to a Terminal Line................................................................................................................ 69
Conguring Logging........................................................................................................................................................ 69
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management.......................................................................................... 69
Disabling System Logging......................................................................................................................................... 70
Sending System Messages to a Syslog Server...................................................................................................... 70
Conguring a UNIX System as a Syslog Server...........................................................................................................70
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity................................................................................................................... 71
Conguring Login Activity Tracking..........................................................................................................................71
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................73
Conguring Concurrent Session Limit.....................................................................................................................73
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Changing System Logging Settings............................................................................................................................... 74
Display the Logging Buer and the Logging Conguration........................................................................................75
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services.......................................................................................................................................................78
4
Contents