Dell S6100 Configuration Manual page 4

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

4 Management............................................................................................................................................... 58
Configuring Privilege Levels........................................................................................................................................... 58
Creating a Custom Privilege Level........................................................................................................................... 59
Removing a Command from EXEC Mode.............................................................................................................. 59
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................59
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to Different Modes........................................................................................................................59
Applying a Privilege Level to a Username................................................................................................................61
Applying a Privilege Level to a Terminal Line........................................................................................................... 61
Configuring Logging......................................................................................................................................................... 61
Audit and Security Logs............................................................................................................................................ 62
Configuring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Log Messages in the Internal Buffer..............................................................................................................................65
Configuration Task List for System Log Management.......................................................................................... 65
Disabling System Logging............................................................................................................................................... 65
Sending System Messages to a Syslog Server............................................................................................................65
Configuring a UNIX System as a Syslog Server.....................................................................................................65
Track Login Activity......................................................................................................................................................... 66
Restrictions for Tracking Login Activity.................................................................................................................. 66
Configuring Login Activity Tracking......................................................................................................................... 66
Display Login Statistics.............................................................................................................................................. 67
Limit Concurrent Login Sessions....................................................................................................................................68
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 68
Configuring Concurrent Session Limit.....................................................................................................................68
Enabling the System to Clear Existing Sessions.................................................................................................... 69
Enabling Secured CLI Mode........................................................................................................................................... 70
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buffer and the Logging Configuration.........................................................................................71
Configuring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................73
Configuration Task List for File Transfer Services.................................................................................................. 73
Enabling the FTP Server........................................................................................................................................... 74
Configuring FTP Server Parameters........................................................................................................................74
Configuring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................ 75
Configuring Login Authentication for Terminal Lines............................................................................................. 76
Setting Timeout for EXEC Privilege Mode....................................................................................................................77
Using Telnet to get to Another Network Device.......................................................................................................... 78
Lock CONFIGURATION Mode....................................................................................................................................... 78
Viewing the Configuration Lock Status...................................................................................................................78
LPC Bus Quality Degradation......................................................................................................................................... 79
4
Contents

Advertisement

Table of Contents
loading

Table of Contents