DELL S6000-ON User Manual

Page of 1100
Sending System Messages to a Syslog Server
To send system messages to a specified syslog server, use the following command. The following syslog 
standards are supported: RFC 5424 The SYSLOG Protocol, R.Gerhards and Adiscon GmbH, March 2009, 
obsoletes RFC 3164 and RFC 5426 Transmission of Syslog Messages over UDP.
• Specify the server to which you want to send system messages. You can configure up to eight syslog 
servers.
CONFIGURATION mode
logging {ip-address | ipv6-address | hostname} {{udp {port}} | {tcp {port}}}
You can export system logs to an external server that is connected through a different VRF.
Configuring a UNIX System as a Syslog Server
To configure a UNIX System as a syslog server, use the following command.
• Configure a UNIX system as a syslog server by adding the following lines to /etc/syslog.conf on the 
UNIX system and assigning write permissions to the file.
– Add line on a 4.1 BSD UNIX system. local7.debugging /var/log/ftos.log
– Add line on a 5.7 SunOS UNIX system. local7.debugging /var/adm/ftos.log
In the previous lines, local7 is the logging facility level and debugging is the severity level.
Track Login Activity
Dell Networking OS enables you to track the login activity of users and view the successful and 
unsuccessful login events.
When you log in using the console or VTY line, the system displays the last successful login details of the 
current user and the number of unsuccessful login attempts since your last successful login to the 
system. The system stores the number of unsuccessful login attempts that have occurred in the last 30 
days by default. You can change the default value to any number of days from 1 to 30. By default, login 
activity tracking is disabled. You can enable it using the login statistics enable command from 
the configuration mode.
Restrictions for Tracking Login Activity
These restrictions apply for tracking login activity:
• Only the system and security administrators can configure login activity tracking and view the login 
activity details of other users.
• Login statistics is not applicable for login sessions that do not use user names for authentication. For 
example, the system does not report login activity for a telnet session that prompts only a password.
Management
69