Reference Guide

Enabling Software Features on Devices Using a Command Option................................................ 55
View Command History......................................................................................................................56
Upgrading Dell Networking OS.......................................................................................................... 56
Using HTTP for File Transfers............................................................................................................. 56
Using Hashes to Validate Software Images........................................................................................57
4 Management............................................................................................................59
Configuring Privilege Levels............................................................................................................... 59
Creating a Custom Privilege Level................................................................................................59
Removing a Command from EXEC Mode................................................................................... 59
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 59
Allowing Access to CONFIGURATION Mode Commands..........................................................60
Allowing Access to the Following Modes.................................................................................... 60
Applying a Privilege Level to a Username.................................................................................... 62
Applying a Privilege Level to a Terminal Line...............................................................................62
Configuring Logging...........................................................................................................................62
Audit and Security Logs.................................................................................................................63
Configuring Logging Format ...................................................................................................... 64
Display the Logging Buffer and the Logging Configuration........................................................65
Setting Up a Secure Connection to a Syslog Server....................................................................66
Log Messages in the Internal Buffer................................................................................................... 67
Configuration Task List for System Log Management.................................................................67
Disabling System Logging...................................................................................................................67
Sending System Messages to a Syslog Server....................................................................................67
Configuring a UNIX System as a Syslog Server............................................................................68
Changing System Logging Settings................................................................................................... 68
Display the Logging Buffer and the Logging Configuration............................................................. 69
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages.............................................................................................................. 71
Enabling Timestamp on Syslog Messages.......................................................................................... 71
File Transfer Services...........................................................................................................................72
Configuration Task List for File Transfer Services........................................................................ 72
Enabling the FTP Server.................................................................................................................72
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 73
Terminal Lines..................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line..................................................................... 74
Configuring Login Authentication for Terminal Lines..................................................................75
Setting Time Out of EXEC Privilege Mode......................................................................................... 76
Using Telnet to get to Another Network Device............................................................................... 76
Lock CONFIGURATION Mode............................................................................................................ 77
Viewing the Configuration Lock Status........................................................................................ 77