Administrator Guide

Enabling Software Features on Devices Using a Command Option................................................ 52
View Command History......................................................................................................................53
Upgrading Dell Networking OS.......................................................................................................... 53
Using HTTP for File Transfers............................................................................................................. 54
Using Hashes to Validate Software Images........................................................................................54
4 Management........................................................................................................56
Configuring Privilege Levels............................................................................................................... 56
Creating a Custom Privilege Level................................................................................................56
Removing a Command from EXEC Mode................................................................................... 56
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 57
Allowing Access to CONFIGURATION Mode Commands...........................................................57
Allowing Access to the Following Modes.....................................................................................57
Applying a Privilege Level to a Username.................................................................................... 59
Applying a Privilege Level to a Terminal Line...............................................................................59
Configuring Logging...........................................................................................................................59
Audit and Security Logs................................................................................................................ 60
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................62
Log Messages in the Internal Buffer...................................................................................................63
Configuration Task List for System Log Management.................................................................63
Disabling System Logging...................................................................................................................63
Sending System Messages to a Syslog Server................................................................................... 64
Configuring a UNIX System as a Syslog Server............................................................................64
Changing System Logging Settings................................................................................................... 64
Display the Logging Buffer and the Logging Configuration............................................................. 65
Configuring a UNIX Logging Facility Level.........................................................................................66
Synchronizing Log Messages..............................................................................................................67
Enabling Timestamp on Syslog Messages..........................................................................................67
File Transfer Services.......................................................................................................................... 68
Configuration Task List for File Transfer Services........................................................................68
Enabling the FTP Server................................................................................................................ 68
Configuring FTP Server Parameters............................................................................................. 69
Configuring FTP Client Parameters..............................................................................................69
Terminal Lines..................................................................................................................................... 70
Denying and Permitting Access to a Terminal Line.....................................................................70
Configuring Login Authentication for Terminal Lines..................................................................71
Setting Time Out of EXEC Privilege Mode..........................................................................................72
Using Telnet to get to Another Network Device................................................................................72
Lock CONFIGURATION Mode............................................................................................................73
Viewing the Configuration Lock Status........................................................................................ 73
Recovering from a Forgotten Password on the Z9000 System........................................................74