Users Guide

Removing a Command from EXEC Mode..................................................................................................................53
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 53
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 53
Allowing Access to Different Modes...........................................................................................................................53
Applying a Privilege Level to a Username...................................................................................................................55
Applying a Privilege Level to a Terminal Line............................................................................................................. 55
Configuring Logging............................................................................................................................................................55
Audit and Security Logs................................................................................................................................................55
Configuring Logging Format .................................................................................................................................57
Display the Logging Buffer and the Logging Configuration..................................................................................... 57
Setting Up a Secure Connection to a Syslog Server.......................................................................................58
Sending System Messages to a Syslog Server......................................................................................................... 59
Track Login Activity............................................................................................................................................................ 59
Restrictions for Tracking Login Activity..................................................................................................................... 59
Configuring Login Activity Tracking............................................................................................................................ 59
Display Login Statistics................................................................................................................................................. 60
Limit Concurrent Login Sessions........................................................................................................................................61
Restrictions for Limiting the Number of Concurrent Sessions.................................................................................61
Configuring Concurrent Session Limit.........................................................................................................................61
Enabling the System to Clear Existing Sessions........................................................................................................62
Log Messages in the Internal Buffer.................................................................................................................................62
Disabling System Logging...................................................................................................................................................63
Sending System Messages to a Syslog Server............................................................................................................... 63
Configuring a UNIX System as a Syslog Server........................................................................................................ 63
Changing System Logging Settings..................................................................................................................................63
Display the Logging Buffer and the Logging Configuration...........................................................................................64
Configuring a UNIX Logging Facility Level.......................................................................................................................65
Synchronizing Log Messages............................................................................................................................................ 66
Enabling Timestamp on Syslog Messages....................................................................................................................... 66
File Transfer Services......................................................................................................................................................... 66
Enabling the FTP Server...............................................................................................................................................67
Configuring FTP Server Parameters...........................................................................................................................67
Configuring FTP Client Parameters............................................................................................................................ 67
Terminal Lines...................................................................................................................................................................... 68
Denying and Permitting Access to a Terminal Line...................................................................................................68
Configuring Login Authentication for Terminal Lines................................................................................................69
Setting Timeout for EXEC Privilege Mode.......................................................................................................................70
Using Telnet to get to Another Network Device.............................................................................................................70
Lock CONFIGURATION Mode........................................................................................................................................... 71
Restoring the Factory Default Settings.............................................................................................................................71
Restoring Factory Default Environment Variables.................................................................................................... 72
Chapter 5: 802.1X......................................................................................................................... 74
Port-Authentication Process............................................................................................................................................. 75
EAP over RADIUS..........................................................................................................................................................76
Configuring 802.1X.............................................................................................................................................................. 77
Important Points to Remember......................................................................................................................................... 77
Enabling 802.1X....................................................................................................................................................................78
Configuring Request Identity Re-Transmissions............................................................................................................. 79
Configuring a Quiet Period after a Failed Authentication.........................................................................................80
4
Contents