Setup Guide

Creating a Custom Privilege Level...........................................................................................................................60
Removing a Command from EXEC Mode.............................................................................................................. 60
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 60
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to the Following Modes................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 62
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 63
Conguring Logging Format ...................................................................................................................................65
Setting Up a Secure Connection to a Syslog Server............................................................................................ 65
Track Login Activity..........................................................................................................................................................67
Restrictions for Tracking Login Activity...................................................................................................................67
Conguring Login Activity Tracking......................................................................................................................... 67
Display Login Statistics.............................................................................................................................................. 67
Limit Concurrent Login Sessions....................................................................................................................................69
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 69
Conguring Concurrent Session Limit.....................................................................................................................69
Enabling the System to Clear Existing Sessions.................................................................................................... 70
Enabling Secured CLI Mode........................................................................................................................................... 70
Log Messages in the Internal Buer...............................................................................................................................71
Conguration Task List for System Log Management...........................................................................................71
Disabling System Logging................................................................................................................................................ 71
Sending System Messages to a Syslog Server.............................................................................................................71
Conguring a UNIX System as a Syslog Server.....................................................................................................72
Display the Logging Buer and the Logging Conguration........................................................................................ 72
Changing System Logging Settings...............................................................................................................................73
Conguring a UNIX Logging Facility Level....................................................................................................................73
Synchronizing Log Messages......................................................................................................................................... 74
Enabling Timestamp on Syslog Messages....................................................................................................................75
File Transfer Services.......................................................................................................................................................76
Conguration Task List for File Transfer Services..................................................................................................76
Enabling the FTP Server........................................................................................................................................... 77
Conguring FTP Server Parameters........................................................................................................................77
Conguring FTP Client Parameters......................................................................................................................... 77
Terminal Lines................................................................................................................................................................... 78
Denying and Permitting Access to a Terminal Line................................................................................................ 78
Conguring Login Authentication for Terminal Lines.............................................................................................79
Setting Time Out of EXEC Privilege Mode...................................................................................................................79
Using Telnet to Access Another Network Device........................................................................................................80
Lock CONFIGURATION Mode........................................................................................................................................81
Viewing the Conguration Lock Status................................................................................................................... 81
LPC Bus Quality Degradation..........................................................................................................................................81
LBQA (LPC Bus Quality Analyzer) Failure Detection mode..................................................................................82
Recovering from a Forgotten Password ...................................................................................................................... 83
4
Contents