Administrator Guide

Removing a Command from EXEC Mode..............................................................................................................56
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 56
Allowing Access to CONFIGURATION Mode Commands................................................................................. 56
Allowing Access to Different Modes...................................................................................................................... 56
Applying a Privilege Level to a Username..............................................................................................................58
Applying a Privilege Level to a Terminal Line....................................................................................................... 58
Configuring Logging......................................................................................................................................................... 58
Audit and Security Logs.............................................................................................................................................58
Configuring Logging Format .............................................................................................................................60
Display the Logging Buffer and the Logging Configuration..............................................................................60
Setting Up a Secure Connection to a Syslog Server................................................................................. 61
Sending System Messages to a Syslog Server.................................................................................................... 62
Track Login Activity..........................................................................................................................................................62
Restrictions for Tracking Login Activity................................................................................................................ 62
Configuring Login Activity Tracking........................................................................................................................63
Display Login Statistics.............................................................................................................................................. 63
Limit Concurrent Login Sessions...................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 65
Configuring Concurrent Session Limit................................................................................................................... 65
Enabling the System to Clear Existing Sessions..................................................................................................65
Enabling Secured CLI Mode............................................................................................................................................66
Log Messages in the Internal Buffer............................................................................................................................ 66
Disabling System Logging............................................................................................................................................... 66
Sending System Messages to a Syslog Server.......................................................................................................... 67
Configuring a UNIX System as a Syslog Server...................................................................................................67
Changing System Logging Settings..............................................................................................................................67
Display the Logging Buffer and the Logging Configuration....................................................................................68
Configuring a UNIX Logging Facility Level..................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 69
Enabling Timestamp on Syslog Messages...................................................................................................................70
File Transfer Services.......................................................................................................................................................73
Enabling the FTP Server............................................................................................................................................ 73
Configuring FTP Server Parameters.......................................................................................................................73
Configuring FTP Client Parameters........................................................................................................................ 74
Terminal Lines.....................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................. 74
Configuring Login Authentication for Terminal Lines......................................................................................... 75
Setting Timeout for EXEC Privilege Mode..................................................................................................................76
Using Telnet to get to Another Network Device....................................................................................................... 77
Lock CONFIGURATION Mode........................................................................................................................................77
LPC Bus Quality Degradation......................................................................................................................................... 78
Reloading the system....................................................................................................................................................... 78
Viewing the Reason for Last System Reboot.............................................................................................................79
Chapter 5: 802.1X....................................................................................................................... 80
Port-Authentication Process...........................................................................................................................................81
EAP over RADIUS........................................................................................................................................................82
Configuring 802.1X............................................................................................................................................................83
Important Points to Remember..................................................................................................................................... 83
Configuring dot1x Profile ................................................................................................................................................83
4
Contents