Viewing Files..................................................................................................................................57
Managing the File System...................................................................................................................58
View the Command History...............................................................................................................59
Using HTTP for File Transfers.............................................................................................................60
Upgrading and Downgrading the Dell Networking OS.....................................................................60
Using Hashes to Validate Software Images.......................................................................................60
4 Management....................................................................................................... 62
Configuring Privilege Levels...............................................................................................................62
Creating a Custom Privilege Level................................................................................................62
Customizing a Privilege Level.......................................................................................................63
Applying a Privilege Level to a Username....................................................................................64
Applying a Privilege Level to a Terminal Line...............................................................................65
Configuring Logging...........................................................................................................................65
Audit and Security Logs.................................................................................................................65
Configuring Logging Format .......................................................................................................67
Setting Up a Secure Connection to a Syslog Server....................................................................68
Display the Logging Buffer and the Logging Configuration.............................................................69
Log Messages in the Internal Buffer...................................................................................................70
Configuration Task List for System Log Management.................................................................70
Disabling System Logging...................................................................................................................70
Sending System Messages to a Syslog Server....................................................................................70
Configuring a UNIX System as a Syslog Server.............................................................................71
Changing System Logging Settings....................................................................................................71
Display the Logging Buffer and the Logging Configuration..............................................................72
Configuring a UNIX Logging Facility Level.........................................................................................73
Synchronizing Log Messages..............................................................................................................74
Enabling Timestamp on Syslog Messages..........................................................................................74
File Transfer Services...........................................................................................................................75
Configuration Task List for File Transfer Services........................................................................75
Enabling the FTP Server.................................................................................................................75
Configuring FTP Server Parameters..............................................................................................76
Configuring FTP Client Parameters..............................................................................................76
Terminal Lines......................................................................................................................................77
Denying and Permitting Access to a Terminal Line.....................................................................77
Configuring Login Authentication for Terminal Lines.................................................................78
Setting Time Out of EXEC Privilege Mode.........................................................................................79
Using Telnet to get to Another Network Device...............................................................................79
Lock CONFIGURATION Mode...........................................................................................................80
Viewing the Configuration Lock Status........................................................................................80
Limit Concurrent Login Sessions........................................................................................................81
Restrictions for Limiting the Number of Concurrent Sessions....................................................81
4