Reference Guide

Upgrading Dell Networking OS.......................................................................................................... 54
Using HTTP for File Transfers............................................................................................................. 54
Using Hashes to Verify Software Images Before Installation............................................................ 55
4 Management........................................................................................................57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 58
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to Different Modes............................................................................................ 58
Applying a Privilege Level to a Username.................................................................................... 59
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs................................................................................................................ 60
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................62
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server................................................................................... 64
Configuring a UNIX System as a Syslog Server............................................................................65
Track Login Activity.............................................................................................................................65
Restrictions for Tracking Login Activity........................................................................................65
Configuring Login Activity Tracking............................................................................................. 65
Display Login Statistics..................................................................................................................66
Limit Concurrent Login Sessions........................................................................................................67
Restrictions for Limiting the Number of Concurrent Sessions....................................................67
Configuring Concurrent Session Limit......................................................................................... 67
Enabling the System to Clear Existing Sessions...........................................................................67
Changing System Logging Settings................................................................................................... 68
Display the Logging Buffer and the Logging Configuration............................................................. 69
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages.............................................................................................................. 71
Enabling Timestamp on Syslog Messages.......................................................................................... 71
File Transfer Services...........................................................................................................................72
Configuration Task List for File Transfer Services........................................................................ 72
Enabling the FTP Server.................................................................................................................72
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 73
Terminal Lines..................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line..................................................................... 74
4