Concept Guide

Upgrading Dell EMC Networking OS............................................................................................................................ 59
Verify Software Images Before Installation...................................................................................................................59
Using HTTP for File Transfers........................................................................................................................................60
4 Management................................................................................................................................................ 61
Conguring Privilege Levels............................................................................................................................................ 61
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 62
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................62
Allowing Access to CONFIGURATION Mode Commands....................................................................................62
Allowing Access to Dierent Modes........................................................................................................................62
Applying a Privilege Level to a Username............................................................................................................... 64
Applying a Privilege Level to a Terminal Line.......................................................................................................... 64
Conguring Logging........................................................................................................................................................ 64
Audit and Security Logs............................................................................................................................................65
Conguring Logging Format ...................................................................................................................................67
Display the Logging Buer and the Logging Conguration.................................................................................. 67
Setting Up a Secure Connection to a Syslog Server.............................................................................................68
Sending System Messages to a Syslog Server......................................................................................................69
Track Login Activity......................................................................................................................................................... 69
Restrictions for Tracking Login Activity.................................................................................................................. 69
Conguring Login Activity Tracking.........................................................................................................................69
Display Login Statistics..............................................................................................................................................70
Limit Concurrent Login Sessions.....................................................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions............................................................................. 71
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 72
Enabling Secured CLI Mode............................................................................................................................................73
Log Messages in the Internal Buer..............................................................................................................................73
Conguration Task List for System Log Management.......................................................................................... 73
Disabling System Logging............................................................................................................................................... 73
Sending System Messages to a Syslog Server............................................................................................................ 74
Conguring a UNIX System as a Syslog Server.....................................................................................................74
Changing System Logging Settings...............................................................................................................................74
Display the Logging Buer and the Logging Conguration........................................................................................ 75
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 77
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
File Transfer Services.......................................................................................................................................................78
Conguration Task List for File Transfer Services..................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................78
Conguring FTP Client Parameters......................................................................................................................... 79
Terminal Lines................................................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line................................................................................................80
Conguring Login Authentication for Terminal Lines..............................................................................................81
4
Contents