White Papers

Congure File Management........................................................................................................................................... 55
Copying Files to and from the System..........................................................................................................................55
Important Points to Remember................................................................................................................................56
Mounting an NFS File System........................................................................................................................................56
Important Points to Remember................................................................................................................................57
Saving the Running-Conguration................................................................................................................................ 58
Viewing Files.....................................................................................................................................................................58
View Conguration Files................................................................................................................................................. 59
Compressing Conguration Files................................................................................................................................... 60
Managing the File System.............................................................................................................................................. 63
Enabling Software Features on Devices Using a Command Option..........................................................................63
View Command History.................................................................................................................................................. 64
Upgrading and Downgrading Dell Networking OS.......................................................................................................64
Verify Software Images Before Installation...................................................................................................................64
Using HTTP for File Transfers........................................................................................................................................ 65
4 Switch Management.................................................................................................................................... 67
Conguring Privilege Levels............................................................................................................................................67
Creating a Custom Privilege Level........................................................................................................................... 67
Removing a Command from EXEC Mode.................................................................................................................... 67
Moving a Command from EXEC Privilege Mode to EXEC Mode..............................................................................67
Allowing Access to CONFIGURATION Mode Commands..........................................................................................68
Allowing Access to the Following Modes......................................................................................................................68
Applying a Privilege Level to a Username..................................................................................................................... 69
Applying a Privilege Level to a Terminal Line................................................................................................................ 70
Conguring Logging.........................................................................................................................................................70
Log Messages in the Internal Buer..............................................................................................................................70
Conguration Task List for System Log Management.......................................................................................... 70
Disabling System Logging..........................................................................................................................................71
Sending System Messages to a Syslog Server.......................................................................................................71
Conguring a UNIX System as a Syslog Server............................................................................................................71
Track Login Activity.......................................................................................................................................................... 71
Restrictions for Tracking Login Activity...................................................................................................................72
Conguring Login Activity Tracking......................................................................................................................... 72
Display Login Statistics..............................................................................................................................................72
Limit Concurrent Login Sessions....................................................................................................................................74
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................74
Conguring Concurrent Session Limit.....................................................................................................................74
Enabling the System to Clear Existing Sessions.....................................................................................................74
Enabling Secured CLI Mode........................................................................................................................................... 75
Changing System Logging Settings...............................................................................................................................75
Display the Logging Buer and the Logging Conguration........................................................................................ 76
Conguring a UNIX Logging Facility Level.................................................................................................................... 77
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services.......................................................................................................................................................79
4
Contents