Users Guide
Using Hashes to Validate Software Images...................................................................................................................... 54
4 Management.................................................................................................................56
Conguring Privilege Levels............................................................................................................................................. 56
Creating a Custom Privilege Level..............................................................................................................................56
Removing a Command from EXEC Mode.................................................................................................................. 56
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................56
Allowing Access to CONFIGURATION Mode Commands...........................................................................................56
Allowing Access to the Following Modes.................................................................................................................... 57
Applying a Privilege Level to a Username................................................................................................................... 58
Applying a Privilege Level to a Terminal Line...............................................................................................................59
Conguring Logging......................................................................................................................................................... 59
Audit and Security Logs............................................................................................................................................. 59
Conguring Logging Format ......................................................................................................................................61
Display the Logging Buer and the Logging Conguration..........................................................................................61
Setting Up a Secure Connection to a Syslog Server...................................................................................................62
Log Messages in the Internal Buer................................................................................................................................. 63
Conguration Task List for System Log Management................................................................................................ 63
Disabling System Logging.................................................................................................................................................63
Sending System Messages to a Syslog Server................................................................................................................. 63
Conguring a UNIX System as a Syslog Server..........................................................................................................63
Track Login Activity.......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................... 64
Conguring Login Activity Tracking............................................................................................................................ 64
Display Login Statistics...............................................................................................................................................65
Limit Concurrent Login Sessions...................................................................................................................................... 65
Restrictions for Limiting the Number of Concurrent Sessions.................................................................................... 66
Conguring Concurrent Session Limit........................................................................................................................ 66
Enabling the System to Clear Existing Sessions......................................................................................................... 66
Changing System Logging Settings.................................................................................................................................. 67
Display the Logging Buer and the Logging Conguration............................................................................................... 68
Conguring a UNIX Logging Facility Level........................................................................................................................ 68
Synchronizing Log Messages........................................................................................................................................... 69
Enabling Timestamp on Syslog Messages.........................................................................................................................70
File Transfer Services....................................................................................................................................................... 70
Conguration Task List for File Transfer Services....................................................................................................... 70
Enabling the FTP Server............................................................................................................................................. 71
Conguring FTP Server Parameters............................................................................................................................71
Conguring FTP Client Parameters............................................................................................................................. 71
Terminal Lines...................................................................................................................................................................72
Denying and Permitting Access to a Terminal Line......................................................................................................72
Conguring Login Authentication for Terminal Lines................................................................................................... 73
Setting Time Out of EXEC Privilege Mode....................................................................................................................... 74
Using Telnet to get to Another Network Device............................................................................................................... 75
Lock CONFIGURATION Mode..........................................................................................................................................75
Viewing the Conguration Lock Status.......................................................................................................................75
4










