Administrator Guide

Removing a Command from EXEC Mode..................................................................................................................56
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 56
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 56
Allowing Access to Different Modes...........................................................................................................................56
Applying a Privilege Level to a Username...................................................................................................................58
Applying a Privilege Level to a Terminal Line............................................................................................................. 58
Configuring Logging............................................................................................................................................................58
Audit and Security Logs................................................................................................................................................58
Configuring Logging Format ................................................................................................................................ 60
Display the Logging Buffer and the Logging Configuration.....................................................................................60
Setting Up a Secure Connection to a Syslog Server....................................................................................... 61
Sending System Messages to a Syslog Server..........................................................................................................62
Track Login Activity............................................................................................................................................................ 62
Restrictions for Tracking Login Activity......................................................................................................................62
Configuring Login Activity Tracking............................................................................................................................ 62
Display Login Statistics................................................................................................................................................. 63
Limit Concurrent Login Sessions.......................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions................................................................................64
Configuring Concurrent Session Limit........................................................................................................................ 64
Enabling the System to Clear Existing Sessions........................................................................................................65
Enabling Secured CLI Mode...............................................................................................................................................65
Log Messages in the Internal Buffer.................................................................................................................................66
Disabling System Logging...................................................................................................................................................66
Sending System Messages to a Syslog Server............................................................................................................... 66
Configuring a UNIX System as a Syslog Server........................................................................................................ 66
Changing System Logging Settings.................................................................................................................................. 67
Display the Logging Buffer and the Logging Configuration...........................................................................................67
Configuring a UNIX Logging Facility Level.......................................................................................................................68
Synchronizing Log Messages............................................................................................................................................ 69
Enabling Timestamp on Syslog Messages....................................................................................................................... 69
File Transfer Services..........................................................................................................................................................72
Enabling the FTP Server...............................................................................................................................................72
Configuring FTP Server Parameters...........................................................................................................................72
Configuring FTP Client Parameters.............................................................................................................................73
Terminal Lines...................................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line................................................................................................... 73
Configuring Login Authentication for Terminal Lines................................................................................................74
Setting Timeout for EXEC Privilege Mode.......................................................................................................................75
Using Telnet to get to Another Network Device.............................................................................................................76
Lock CONFIGURATION Mode.......................................................................................................................................... 76
LPC Bus Quality Degradation.............................................................................................................................................77
Reloading the system.......................................................................................................................................................... 77
Viewing the Reason for Last System Reboot..................................................................................................................78
5 802.1X....................................................................................................................................... 79
Port-Authentication Process............................................................................................................................................. 80
EAP over RADIUS.......................................................................................................................................................... 81
Configuring 802.1X...............................................................................................................................................................81
Important Points to Remember.........................................................................................................................................82
Configuring dot1x Profile ................................................................................................................................................... 82
4
Contents