Users Guide

Removing a Command from EXEC Mode..............................................................................................................59
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 59
Allowing Access to CONFIGURATION Mode Commands................................................................................. 59
Allowing Access to Different Modes...................................................................................................................... 59
Applying a Privilege Level to a Username.............................................................................................................. 61
Applying a Privilege Level to a Terminal Line........................................................................................................ 61
Configuring Logging.......................................................................................................................................................... 61
Audit and Security Logs..............................................................................................................................................61
Configuring Logging Format .............................................................................................................................63
Display the Logging Buffer and the Logging Configuration..............................................................................63
Setting Up a Secure Connection to a Syslog Server.................................................................................64
Sending System Messages to a Syslog Server.................................................................................................... 65
Track Login Activity..........................................................................................................................................................65
Restrictions for Tracking Login Activity................................................................................................................ 65
Configuring Login Activity Tracking........................................................................................................................66
Display Login Statistics.............................................................................................................................................. 66
Limit Concurrent Login Sessions................................................................................................................................... 67
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 68
Configuring Concurrent Session Limit....................................................................................................................68
Enabling the System to Clear Existing Sessions..................................................................................................68
Enabling Secured CLI Mode............................................................................................................................................69
Log Messages in the Internal Buffer............................................................................................................................ 69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server.......................................................................................................... 70
Configuring a UNIX System as a Syslog Server...................................................................................................70
Changing System Logging Settings..............................................................................................................................70
Display the Logging Buffer and the Logging Configuration.....................................................................................71
Configuring a UNIX Logging Facility Level.................................................................................................................. 72
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages................................................................................................................... 73
File Transfer Services.......................................................................................................................................................76
Enabling the FTP Server............................................................................................................................................76
Configuring FTP Server Parameters.......................................................................................................................76
Configuring FTP Client Parameters.........................................................................................................................77
Terminal Lines.....................................................................................................................................................................77
Denying and Permitting Access to a Terminal Line............................................................................................. 77
Configuring Login Authentication for Terminal Lines..........................................................................................78
Setting Timeout for EXEC Privilege Mode..................................................................................................................79
Using Telnet to get to Another Network Device.......................................................................................................80
Lock CONFIGURATION Mode....................................................................................................................................... 80
Reloading the system........................................................................................................................................................81
Restoring the Factory Default Settings.......................................................................................................................82
Restoring Factory Default Environment Variables.............................................................................................. 82
Viewing the Reason for Last System Reboot.............................................................................................................83
Chapter 5: 802.1X....................................................................................................................... 85
Port-Authentication Process..........................................................................................................................................86
EAP over RADIUS........................................................................................................................................................87
Configuring 802.1X............................................................................................................................................................88
Important Points to Remember..................................................................................................................................... 88
4
Contents