Administrator Guide

Applying a Privilege Level to a Username..............................................................................................................57
Applying a Privilege Level to a Terminal Line........................................................................................................57
Configuring Logging..........................................................................................................................................................57
Audit and Security Logs............................................................................................................................................. 57
Configuring Logging Format .............................................................................................................................59
Setting Up a Secure Connection to a Syslog Server................................................................................ 59
Track Login Activity...........................................................................................................................................................61
Restrictions for Tracking Login Activity................................................................................................................. 61
Configuring Login Activity Tracking........................................................................................................................ 61
Display Login Statistics...............................................................................................................................................61
Limit Concurrent Login Sessions...................................................................................................................................63
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 63
Configuring Concurrent Session Limit....................................................................................................................63
Enabling the System to Clear Existing Sessions.................................................................................................. 63
Enabling Secured CLI Mode............................................................................................................................................64
Log Messages in the Internal Buffer............................................................................................................................ 64
Disabling System Logging............................................................................................................................................... 65
Sending System Messages to a Syslog Server..........................................................................................................65
Configuring a UNIX System as a Syslog Server...................................................................................................65
Display the Logging Buffer and the Logging Configuration....................................................................................66
Changing System Logging Settings..............................................................................................................................66
Configuring a UNIX Logging Facility Level..................................................................................................................67
Synchronizing Log Messages......................................................................................................................................... 68
Enabling Timestamp on Syslog Messages...................................................................................................................68
File Transfer Services.......................................................................................................................................................70
Enabling the FTP Server............................................................................................................................................70
Configuring FTP Server Parameters.......................................................................................................................70
Configuring FTP Client Parameters......................................................................................................................... 71
Terminal Lines..................................................................................................................................................................... 71
Denying and Permitting Access to a Terminal Line..............................................................................................71
Configuring Login Authentication for Terminal Lines..........................................................................................72
Setting Time Out of EXEC Privilege Mode................................................................................................................. 72
Using Telnet to Access Another Network Device..................................................................................................... 73
Lock CONFIGURATION Mode........................................................................................................................................73
LPC Bus Quality Degradation......................................................................................................................................... 74
Recovering from a Forgotten Password .................................................................................................................... 75
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.............................76
Recovering from a Failed Start...................................................................................................................................... 76
Restoring Factory-Default Settings..............................................................................................................................76
Restoring Factory-Default Boot Environment Variables.................................................................................... 77
Using Hashes to Verify Software Images Before Installation..................................................................... 78
Verifying System Images on C9010 Components......................................................................................................79
When System Images on C9010 Components Do Not Match..........................................................................80
Manually Resetting the System Image on a C9010 Component......................................................................80
Logging in to the Virtual Console of a C9010 Component.................................................................................81
Booting the C9010 from an Image on a Network Server................................................................................... 81
Configuring C9010 Components to Boot from the RPM CP Image................................................................ 81
Viewing the Reason for Last System Reboot.............................................................................................................82
Chapter 5: 802.1X........................................................................................................................83
4
Contents