Administrator Guide

Upgrading and Downgrading the Dell Networking OS...................................................................................................... 53
Using Hashes to Validate Software Images...................................................................................................................... 53
4 Management.................................................................................................................55
Conguring Privilege Levels............................................................................................................................................. 55
Creating a Custom Privilege Level..............................................................................................................................55
Customizing a Privilege Level.....................................................................................................................................56
Applying a Privilege Level to a Username....................................................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................................................... 57
Conguring Logging......................................................................................................................................................... 58
Audit and Security Logs............................................................................................................................................. 58
Conguring Logging Format .....................................................................................................................................60
Setting Up a Secure Connection to a Syslog Server...................................................................................................60
Display the Logging Buer and the Logging Conguration................................................................................................61
Log Messages in the Internal Buer................................................................................................................................. 62
Conguration Task List for System Log Management................................................................................................ 62
Disabling System Logging.................................................................................................................................................62
Sending System Messages to a Syslog Server................................................................................................................. 62
Conguring a UNIX System as a Syslog Server..........................................................................................................62
Changing System Logging Settings..................................................................................................................................63
Display the Logging Buer and the Logging Conguration............................................................................................... 64
Conguring a UNIX Logging Facility Level........................................................................................................................ 64
Synchronizing Log Messages........................................................................................................................................... 65
Enabling Timestamp on Syslog Messages........................................................................................................................ 66
Enabling Secure Mode..................................................................................................................................................... 66
File Transfer Services........................................................................................................................................................67
Conguration Task List for File Transfer Services........................................................................................................67
Enabling the FTP Server.............................................................................................................................................67
Conguring FTP Server Parameters...........................................................................................................................67
Conguring FTP Client Parameters............................................................................................................................ 68
Terminal Lines...................................................................................................................................................................68
Denying and Permitting Access to a Terminal Line......................................................................................................68
Conguring Login Authentication for Terminal Lines...................................................................................................69
Setting Time Out of EXEC Privilege Mode....................................................................................................................... 70
Using Telnet to get to Another Network Device............................................................................................................... 70
Lock CONFIGURATION Mode.......................................................................................................................................... 71
Viewing the Conguration Lock Status....................................................................................................................... 71
Recovering from a Forgotten Password............................................................................................................................72
Recovering from a Forgotten Enable Password................................................................................................................ 73
Recovering from a Failed Start......................................................................................................................................... 73
5 802.1X........................................................................................................................... 75
The Port-Authentication Process..................................................................................................................................... 76
EAP over RADIUS.......................................................................................................................................................77
Conguring 802.1X........................................................................................................................................................... 78
Related Conguration Tasks....................................................................................................................................... 78
4