Users Guide

Creating a Custom Privilege Level...........................................................................................................................58
Removing a Command from EXEC Mode.............................................................................................................. 58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................58
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to the Following Modes................................................................................................................59
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line...........................................................................................................61
Conguring Logging......................................................................................................................................................... 61
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Track Login Activity......................................................................................................................................................... 65
Restrictions for Tracking Login Activity.................................................................................................................. 65
Conguring Login Activity Tracking.........................................................................................................................65
Display Login Statistics..............................................................................................................................................65
Limit Concurrent Login Sessions....................................................................................................................................67
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................67
Conguring Concurrent Session Limit.....................................................................................................................67
Enabling the System to Clear Existing Sessions.................................................................................................... 68
Enabling Secured CLI Mode........................................................................................................................................... 68
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................70
Display the Logging Buer and the Logging Conguration........................................................................................ 70
Changing System Logging Settings............................................................................................................................... 71
Conguring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services..................................................................................................73
Enabling the FTP Server........................................................................................................................................... 74
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................75
Conguring Login Authentication for Terminal Lines.............................................................................................76
Setting Time Out of EXEC Privilege Mode...................................................................................................................76
Using Telnet to Access Another Network Device........................................................................................................ 77
Lock CONFIGURATION Mode....................................................................................................................................... 78
Viewing the Conguration Lock Status...................................................................................................................78
LPC Bus Quality Degradation......................................................................................................................................... 78
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................79
Recovering from a Forgotten Password ......................................................................................................................80
4
Contents