Enabling Software Features on Devices Using a Command Option.................................................61
View Command History......................................................................................................................62
Upgrading Dell Networking OS.......................................................................................................... 62
Using HTTP for File Transfers............................................................................................................. 62
Using Hashes to Validate Software Images........................................................................................63
4 Management........................................................................................................65
Configuring Privilege Levels............................................................................................................... 65
Creating a Custom Privilege Level................................................................................................65
Removing a Command from EXEC Mode................................................................................... 65
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................66
Allowing Access to CONFIGURATION Mode Commands..........................................................66
Allowing Access to the Following Modes.................................................................................... 66
Applying a Privilege Level to a Username.................................................................................... 68
Applying a Privilege Level to a Terminal Line...............................................................................68
Configuring Logging...........................................................................................................................68
Audit and Security Logs................................................................................................................ 69
Configuring Logging Format .......................................................................................................71
Display the Logging Buffer and the Logging Configuration........................................................ 71
Setting Up a Secure Connection to a Syslog Server.................................................................... 73
Log Messages in the Internal Buffer................................................................................................... 74
Configuration Task List for System Log Management.................................................................74
Disabling System Logging...................................................................................................................74
Sending System Messages to a Syslog Server....................................................................................75
Configuring a UNIX System as a Syslog Server............................................................................ 75
Track Login Activity............................................................................................................................. 75
Restrictions for Tracking Login Activity........................................................................................ 75
Configuring Login Activity Tracking............................................................................................. 76
Display Login Statistics..................................................................................................................76
Limit Concurrent Login Sessions........................................................................................................ 77
Restrictions for Limiting the Number of Concurrent Sessions....................................................77
Configuring Concurrent Session Limit......................................................................................... 77
Enabling the System to Clear Existing Sessions...........................................................................78
Changing System Logging Settings....................................................................................................79
Display the Logging Buffer and the Logging Configuration............................................................. 80
Configuring a UNIX Logging Facility Level........................................................................................ 80
Synchronizing Log Messages............................................................................................................. 82
Enabling Timestamp on Syslog Messages......................................................................................... 82
File Transfer Services...........................................................................................................................83
Configuration Task List for File Transfer Services........................................................................83
Enabling the FTP Server................................................................................................................ 83
Configuring FTP Server Parameters............................................................................................. 84
4