Setup Guide

Upgrading Dell EMC Networking OS............................................................................................................................. 61
Verify Software Images Before Installation....................................................................................................................61
Using HTTP for File Transfers........................................................................................................................................ 62
4 Management................................................................................................................................................64
Conguring Privilege Levels............................................................................................................................................64
Creating a Custom Privilege Level...........................................................................................................................64
Removing a Command from EXEC Mode.............................................................................................................. 65
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 65
Allowing Access to CONFIGURATION Mode Commands....................................................................................65
Allowing Access to Dierent Modes........................................................................................................................65
Applying a Privilege Level to a Username............................................................................................................... 67
Applying a Privilege Level to a Terminal Line...........................................................................................................67
Conguring Logging.........................................................................................................................................................67
Audit and Security Logs............................................................................................................................................ 68
Conguring Logging Format ...................................................................................................................................69
Display the Logging Buer and the Logging Conguration.................................................................................. 70
Setting Up a Secure Connection to a Syslog Server.............................................................................................70
Sending System Messages to a Syslog Server...................................................................................................... 72
Track Login Activity..........................................................................................................................................................72
Restrictions for Tracking Login Activity...................................................................................................................72
Conguring Login Activity Tracking......................................................................................................................... 72
Display Login Statistics..............................................................................................................................................73
Limit Concurrent Login Sessions....................................................................................................................................74
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................74
Conguring Concurrent Session Limit.....................................................................................................................74
Enabling the System to Clear Existing Sessions.................................................................................................... 75
Enabling Secured CLI Mode........................................................................................................................................... 76
Log Messages in the Internal Buer..............................................................................................................................76
Conguration Task List for System Log Management.......................................................................................... 76
Disabling System Logging............................................................................................................................................... 76
Sending System Messages to a Syslog Server............................................................................................................ 77
Conguring a UNIX System as a Syslog Server.....................................................................................................77
Changing System Logging Settings...............................................................................................................................77
Display the Logging Buer and the Logging Conguration........................................................................................ 78
Conguring a UNIX Logging Facility Level.................................................................................................................... 78
Synchronizing Log Messages......................................................................................................................................... 79
Enabling Timestamp on Syslog Messages....................................................................................................................80
File Transfer Services...................................................................................................................................................... 83
Conguration Task List for File Transfer Services..................................................................................................83
Enabling the FTP Server...........................................................................................................................................83
Conguring FTP Server Parameters....................................................................................................................... 83
Conguring FTP Client Parameters.........................................................................................................................84
Terminal Lines...................................................................................................................................................................84
Denying and Permitting Access to a Terminal Line................................................................................................85
Conguring Login Authentication for Terminal Lines.............................................................................................86
4
Contents