EasyManua.ls Logo

Dell S4048-ON - Page 4

Dell S4048-ON
1146 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Upgrading Dell Networking OS...................................................................................................................................... 59
Verify Software Images Before Installation...................................................................................................................59
Using HTTP for File Transfers........................................................................................................................................60
4 Management................................................................................................................................................62
Conguring Privilege Levels............................................................................................................................................62
Creating a Custom Privilege Level...........................................................................................................................63
Removing a Command from EXEC Mode.............................................................................................................. 63
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63
Allowing Access to CONFIGURATION Mode Commands....................................................................................63
Allowing Access to Dierent Modes........................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line.......................................................................................................... 65
Conguring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................ 66
Conguring Logging Format ...................................................................................................................................68
Display the Logging Buer and the Logging Conguration..................................................................................68
Setting Up a Secure Connection to a Syslog Server.............................................................................................69
Sending System Messages to a Syslog Server...................................................................................................... 70
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................70
Conguring Login Activity Tracking......................................................................................................................... 70
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72
Conguring Concurrent Session Limit.....................................................................................................................73
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Log Messages in the Internal Buer.............................................................................................................................. 74
Conguration Task List for System Log Management...........................................................................................74
Disabling System Logging................................................................................................................................................74
Sending System Messages to a Syslog Server............................................................................................................ 75
Conguring a UNIX System as a Syslog Server.....................................................................................................75
Changing System Logging Settings...............................................................................................................................75
Display the Logging Buer and the Logging Conguration........................................................................................ 76
Conguring a UNIX Logging Facility Level.................................................................................................................... 77
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services.......................................................................................................................................................79
Conguration Task List for File Transfer Services..................................................................................................79
Enabling the FTP Server........................................................................................................................................... 79
Conguring FTP Server Parameters........................................................................................................................79
Conguring FTP Client Parameters.........................................................................................................................80
Terminal Lines...................................................................................................................................................................80
Denying and Permitting Access to a Terminal Line.................................................................................................81
Conguring Login Authentication for Terminal Lines.............................................................................................82
4
Contents

Table of Contents

Related product manuals