Administrator Guide
Configure the Overload Bit for a Startup Scenario...................................................................... 51
Viewing Files...................................................................................................................................51
Managing the File System................................................................................................................... 52
Enabling Software Features on Devices Using a Command Option................................................ 53
View Command History......................................................................................................................54
Upgrading Dell Networking OS.......................................................................................................... 55
Using HTTP for File Transfers............................................................................................................. 55
Using Hashes to Validate Software Images........................................................................................55
5 Management............................................................................................................ 57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 57
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to the Following Modes.................................................................................... 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Changing System Logging Settings....................................................................................................65
Display the Logging Buffer and the Logging Configuration............................................................. 66
Configuring a UNIX Logging Facility Level.........................................................................................67
Synchronizing Log Messages............................................................................................................. 68
Enabling Timestamp on Syslog Messages......................................................................................... 68
File Transfer Services.......................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................69
Enabling the FTP Server................................................................................................................ 69
Configuring FTP Server Parameters............................................................................................. 70
Configuring FTP Client Parameters..............................................................................................70
Terminal Lines......................................................................................................................................71
Denying and Permitting Access to a Terminal Line......................................................................71
Configuring Login Authentication for Terminal Lines..................................................................72
Setting Time Out of EXEC Privilege Mode..........................................................................................73
Using Telnet to get to Another Network Device................................................................................73