Manualsbrain.com
fr
English
Deutsch
Español
Italiano
Português
Русский
조선말, 한국어
日本語
中文
Manuels
Marques
DELL
9.7(0.0)
Manuel D’Utilisation
DELL 9.7(0.0) Manuel D’Utilisation
Télécharger
Aimer
Full screen
Plein écran
Page
de
1039
Aller
Using Hashes to Validate Software Images
........................................................................................53
4 Switch Management.......................................................................................... 55
Configuring Privilege Levels
................................................................................................................55
Creating a Custom Privilege Level
................................................................................................55
Removing a Command from EXEC Mode
....................................................................................55
Moving a Command from EXEC Privilege Mode to EXEC Mode
................................................ 55
Allowing Access to CONFIGURATION Mode Commands
.......................................................... 56
Allowing Access to the Following Modes
.................................................................................... 56
Applying a Privilege Level to a Username
.................................................................................... 58
Applying a Privilege Level to a Terminal Line
...............................................................................58
Configuring Logging
........................................................................................................................... 58
Audit and Security Logs
.................................................................................................................59
Configuring Logging Format
...................................................................................................... 60
Setting Up a Secure Connection to a Syslog Server
.................................................................... 61
Log Messages in the Internal Buffer
...................................................................................................62
Configuration Task List for System Log Management
.................................................................62
Disabling System Logging
...................................................................................................................62
Sending System Messages to a Syslog Server
....................................................................................63
Configuring a UNIX System as a Syslog Server
............................................................................63
Display the Logging Buffer and the Logging Configuration
............................................................. 63
Changing System Logging Settings
................................................................................................... 64
Configuring a UNIX Logging Facility Level
.........................................................................................65
Synchronizing Log Messages
............................................................................................................. 66
Enabling Timestamp on Syslog Messages
......................................................................................... 66
File Transfer Services
...........................................................................................................................67
Configuration Task List for File Transfer Services
........................................................................ 67
Enabling the FTP Server
................................................................................................................ 67
Configuring FTP Server Parameters
............................................................................................. 68
Configuring FTP Client Parameters
..............................................................................................68
Terminal Lines
..................................................................................................................................... 69
Denying and Permitting Access to a Terminal Line
.....................................................................69
Configuring Login Authentication for Terminal Lines
................................................................. 70
Setting Time Out of EXEC Privilege Mode
..........................................................................................71
Using Telnet to Access Another Network Device
.............................................................................. 71
Lock CONFIGURATION Mode
............................................................................................................ 72
Viewing the Configuration Lock Status
........................................................................................ 72
Recovering from a Forgotten Password on the Z9500
.....................................................................73
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration
............ 73
Recovering from a Failed Start on the Z9500
....................................................................................74
Restoring Factory-Default Settings
.................................................................................................... 74
Important Points to Remember
....................................................................................................74
Préc
Suiv
1
2
3
4
5
6
…
1039