Users Guide

Creating a Custom Privilege Level........................................................................................................................... 57
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................57
Allowing Access to CONFIGURATION Mode Commands....................................................................................58
Allowing Access to the Following Modes................................................................................................................58
Applying a Privilege Level to a Username...............................................................................................................59
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging........................................................................................................................................................ 60
Audit and Security Logs............................................................................................................................................ 60
Conguring Logging Format ...................................................................................................................................62
Setting Up a Secure Connection to a Syslog Server.............................................................................................62
Track Login Activity......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................64
Conguring Login Activity Tracking.........................................................................................................................64
Display Login Statistics..............................................................................................................................................64
Limit Concurrent Login Sessions....................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 66
Conguring Concurrent Session Limit.....................................................................................................................66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode............................................................................................................................................67
Log Messages in the Internal Buer..............................................................................................................................68
Conguration Task List for System Log Management.......................................................................................... 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Display the Logging Buer and the Logging Conguration........................................................................................69
Changing System Logging Settings...............................................................................................................................70
Conguring a UNIX Logging Facility Level....................................................................................................................70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
File Transfer Services.......................................................................................................................................................72
Conguration Task List for File Transfer Services..................................................................................................72
Enabling the FTP Server........................................................................................................................................... 73
Conguring FTP Server Parameters........................................................................................................................73
Conguring FTP Client Parameters......................................................................................................................... 73
Terminal Lines................................................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line................................................................................................ 74
Conguring Login Authentication for Terminal Lines.............................................................................................75
Setting Time Out of EXEC Privilege Mode...................................................................................................................75
Using Telnet to Access Another Network Device........................................................................................................76
Lock CONFIGURATION Mode....................................................................................................................................... 77
Viewing the Conguration Lock Status...................................................................................................................77
LPC Bus Quality Degradation......................................................................................................................................... 77
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................78
Recovering from a Forgotten Password ...................................................................................................................... 79
4
Contents