Users Guide

Upgrading Dell EMC Networking OS............................................................................................................................ 62
Verify Software Images Before Installation...................................................................................................................62
Using HTTP for File Transfers........................................................................................................................................ 63
4 Management............................................................................................................................................... 65
Conguring Privilege Levels........................................................................................................................................... 65
Creating a Custom Privilege Level...........................................................................................................................66
Removing a Command from EXEC Mode.............................................................................................................. 66
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................66
Allowing Access to CONFIGURATION Mode Commands....................................................................................66
Allowing Access to Dierent Modes........................................................................................................................66
Applying a Privilege Level to a Username............................................................................................................... 68
Applying a Privilege Level to a Terminal Line.......................................................................................................... 68
Conguring Logging........................................................................................................................................................ 68
Audit and Security Logs............................................................................................................................................ 69
Conguring Logging Format ....................................................................................................................................71
Display the Logging Buer and the Logging Conguration...................................................................................71
Setting Up a Secure Connection to a Syslog Server.............................................................................................72
Sending System Messages to a Syslog Server...................................................................................................... 73
Track Login Activity..........................................................................................................................................................73
Restrictions for Tracking Login Activity...................................................................................................................73
Conguring Login Activity Tracking......................................................................................................................... 73
Display Login Statistics.............................................................................................................................................. 74
Limit Concurrent Login Sessions....................................................................................................................................75
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................75
Conguring Concurrent Session Limit.....................................................................................................................76
Enabling the System to Clear Existing Sessions.................................................................................................... 76
Enabling Secured CLI Mode............................................................................................................................................77
Log Messages in the Internal Buer.............................................................................................................................. 77
Conguration Task List for System Log Management...........................................................................................77
Disabling System Logging................................................................................................................................................77
Sending System Messages to a Syslog Server............................................................................................................ 78
Conguring a UNIX System as a Syslog Server.....................................................................................................78
Changing System Logging Settings...............................................................................................................................78
Display the Logging Buer and the Logging Conguration........................................................................................ 79
Conguring a UNIX Logging Facility Level....................................................................................................................80
Synchronizing Log Messages..........................................................................................................................................81
Enabling Timestamp on Syslog Messages.....................................................................................................................81
File Transfer Services...................................................................................................................................................... 82
Conguration Task List for File Transfer Services..................................................................................................82
Enabling the FTP Server...........................................................................................................................................82
Conguring FTP Server Parameters....................................................................................................................... 82
Conguring FTP Client Parameters.........................................................................................................................83
Terminal Lines...................................................................................................................................................................83
Denying and Permitting Access to a Terminal Line................................................................................................84
Conguring Login Authentication for Terminal Lines.............................................................................................85
4
Contents