Enabling Software Features on Devices Using a Command Option
.................................................61
Using Hashes to Validate Software Images
........................................................................................63
Creating a Custom Privilege Level
................................................................................................65
Removing a Command from EXEC Mode
................................................................................... 65
Moving a Command from EXEC Privilege Mode to EXEC Mode
................................................66
Allowing Access to CONFIGURATION Mode Commands
.......................................................... 66
Allowing Access to the Following Modes
.................................................................................... 66
Applying a Privilege Level to a Username
.................................................................................... 68
Applying a Privilege Level to a Terminal Line
...............................................................................68
Display the Logging Buffer and the Logging Configuration
........................................................ 71
Setting Up a Secure Connection to a Syslog Server
.................................................................... 73
Log Messages in the Internal Buffer
Configuration Task List for System Log Management
.................................................................74
Sending System Messages to a Syslog Server
....................................................................................75
Configuring a UNIX System as a Syslog Server
............................................................................ 75
Restrictions for Tracking Login Activity
........................................................................................ 75
Configuring Login Activity Tracking
............................................................................................. 76
Limit Concurrent Login Sessions
Restrictions for Limiting the Number of Concurrent Sessions
....................................................77
Configuring Concurrent Session Limit
......................................................................................... 77
Enabling the System to Clear Existing Sessions
........................................................................... 78
Changing System Logging Settings
Display the Logging Buffer and the Logging Configuration
............................................................. 80
Configuring a UNIX Logging Facility Level
........................................................................................ 80
Enabling Timestamp on Syslog Messages
......................................................................................... 82
Configuration Task List for File Transfer Services
........................................................................83
Configuring FTP Server Parameters
............................................................................................. 84
4
Summary of Contents for S4820T
Page 1: ...Dell Configuration Guide for the S4820T System 9 8 0 0 ...
Page 282: ...Dell 282 Control Plane Policing CoPP ...
Page 622: ...Figure 81 Configuring Interfaces for MSDP 622 Multicast Source Discovery Protocol MSDP ...
Page 623: ...Figure 82 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 623 ...
Page 629: ...Figure 86 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 629 ...
Page 630: ...Figure 87 MSDP Default Peer Scenario 3 630 Multicast Source Discovery Protocol MSDP ...
Page 751: ...10 11 5 2 00 00 05 00 02 04 Member Ports Te 1 2 1 PIM Source Specific Mode PIM SSM 751 ...
Page 905: ...Figure 112 Single and Double Tag First byte TPID Match Service Provider Bridging 905 ...
Page 979: ...6 Member not present 7 Member not present Stacking 979 ...
Page 981: ...storm control Storm Control 981 ...
Page 1103: ...Figure 134 Setup OSPF and Static Routes Virtual Routing and Forwarding VRF 1103 ...