Reference Guide

Allowing Access to the Following Modes.............................................................................................................. 48
Applying a Privilege Level to a Username............................................................................................................. 50
Applying a Privilege Level to a Terminal Line....................................................................................................... 50
Configuring Logging......................................................................................................................................................... 50
Audit and Security Logs.............................................................................................................................................50
Configuring Logging Format .............................................................................................................................52
Setting Up a Secure Connection to a Syslog Server................................................................................ 53
Log Messages in the Internal Buffer............................................................................................................................ 54
Disabling System Logging............................................................................................................................................... 54
Sending System Messages to a Syslog Server.......................................................................................................... 54
Configuring a UNIX System as a Syslog Server...................................................................................................55
Display the Logging Buffer and the Logging Configuration....................................................................................55
Changing System Logging Settings..............................................................................................................................55
Configuring a UNIX Logging Facility Level..................................................................................................................56
Synchronizing Log Messages......................................................................................................................................... 57
Enabling Timestamp on Syslog Messages...................................................................................................................57
File Transfer Services.......................................................................................................................................................58
Enabling the FTP Server............................................................................................................................................58
Configuring FTP Server Parameters...................................................................................................................... 59
Configuring FTP Client Parameters........................................................................................................................59
Terminal Lines.................................................................................................................................................................... 59
Denying and Permitting Access to a Terminal Line.............................................................................................60
Configuring Login Authentication for Terminal Lines......................................................................................... 60
Setting Time Out of EXEC Privilege Mode..................................................................................................................61
Using Telnet to Access Another Network Device......................................................................................................61
Lock CONFIGURATION Mode....................................................................................................................................... 62
Recovering from a Forgotten Password on the Z9500...........................................................................................63
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.............................63
Recovering from a Failed Start on the Z9500........................................................................................................... 63
Restoring Factory-Default Settings..............................................................................................................................64
Restoring Factory-Default Boot Environment Variables....................................................................................64
Chapter 5: 802.1X........................................................................................................................67
The Port-Authentication Process................................................................................................................................. 69
EAP over RADIUS........................................................................................................................................................69
Configuring 802.1X............................................................................................................................................................70
Important Points to Remember..................................................................................................................................... 70
Enabling 802.1X...................................................................................................................................................................71
Configuring Request Identity Re-Transmissions........................................................................................................72
Configuring a Quiet Period after a Failed Authentication..................................................................................73
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 73
Re-Authenticating a Port.................................................................................................................................................74
Configuring Timeouts....................................................................................................................................................... 75
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................76
Guest and Authentication-Fail VLANs..........................................................................................................................77
Configuring a Guest VLAN........................................................................................................................................ 77
Configuring an Authentication-Fail VLAN..............................................................................................................77
Chapter 6: Access Control Lists (ACLs).......................................................................................79
4
Contents