Users Guide

Verify Software Images Before Installation...................................................................................................................53
Using HTTP for File Transfers........................................................................................................................................ 54
4 Management............................................................................................................................................... 55
Conguring Privilege Levels........................................................................................................................................... 55
Creating a Custom Privilege Level...........................................................................................................................55
Removing a Command from EXEC Mode.............................................................................................................. 56
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 56
Allowing Access to CONFIGURATION Mode Commands....................................................................................56
Allowing Access to Dierent Modes........................................................................................................................56
Applying a Privilege Level to a Username............................................................................................................... 58
Applying a Privilege Level to a Terminal Line.......................................................................................................... 58
Conguring Logging........................................................................................................................................................ 58
Audit and Security Logs............................................................................................................................................ 59
Conguring Logging Format ...................................................................................................................................60
Display the Logging Buer and the Logging Conguration...................................................................................61
Setting Up a Secure Connection to a Syslog Server............................................................................................. 61
Sending System Messages to a Syslog Server...................................................................................................... 63
Track Login Activity......................................................................................................................................................... 63
Restrictions for Tracking Login Activity...................................................................................................................63
Conguring Login Activity Tracking......................................................................................................................... 63
Display Login Statistics..............................................................................................................................................64
Limit Concurrent Login Sessions................................................................................................................................... 65
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 65
Conguring Concurrent Session Limit.................................................................................................................... 65
Enabling the System to Clear Existing Sessions.................................................................................................... 66
Log Messages in the Internal Buer..............................................................................................................................66
Conguration Task List for System Log Management.......................................................................................... 67
Disabling System Logging............................................................................................................................................... 67
Sending System Messages to a Syslog Server............................................................................................................ 67
Conguring a UNIX System as a Syslog Server.....................................................................................................67
Changing System Logging Settings...............................................................................................................................68
Display the Logging Buer and the Logging Conguration........................................................................................68
Conguring a UNIX Logging Facility Level....................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services....................................................................................................................................................... 71
Conguration Task List for File Transfer Services...................................................................................................71
Enabling the FTP Server............................................................................................................................................71
Conguring FTP Server Parameters........................................................................................................................72
Conguring FTP Client Parameters......................................................................................................................... 72
Terminal Lines................................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line................................................................................................ 73
Conguring Login Authentication for Terminal Lines............................................................................................. 74
Setting Timeout for EXEC Privilege Mode................................................................................................................... 75
Using Telnet to get to Another Network Device..........................................................................................................75
Lock CONFIGURATION Mode....................................................................................................................................... 76
4
Contents