Users Guide
Using Hashes to Verify Software Images Before Installation.............................................................................................53
4 Management.................................................................................................................55
Conguring Privilege Levels............................................................................................................................................. 55
Creating a Custom Privilege Level..............................................................................................................................55
Removing a Command from EXEC Mode.................................................................................................................. 55
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................55
Allowing Access to CONFIGURATION Mode Commands...........................................................................................55
Allowing Access to Dierent Modes...........................................................................................................................56
Applying a Privilege Level to a Username....................................................................................................................57
Applying a Privilege Level to a Terminal Line...............................................................................................................58
Conguring Logging......................................................................................................................................................... 58
Audit and Security Logs............................................................................................................................................. 58
Conguring Logging Format .....................................................................................................................................60
Display the Logging Buer and the Logging Conguration......................................................................................... 60
Setting Up a Secure Connection to a Syslog Server................................................................................................... 61
Log Messages in the Internal Buer................................................................................................................................. 62
Conguration Task List for System Log Management................................................................................................ 62
Disabling System Logging.................................................................................................................................................62
Sending System Messages to a Syslog Server................................................................................................................. 62
Conguring a UNIX System as a Syslog Server..........................................................................................................62
Track Login Activity.......................................................................................................................................................... 63
Restrictions for Tracking Login Activity...................................................................................................................... 63
Conguring Login Activity Tracking............................................................................................................................ 63
Display Login Statistics...............................................................................................................................................64
Limit Concurrent Login Sessions...................................................................................................................................... 64
Restrictions for Limiting the Number of Concurrent Sessions....................................................................................65
Conguring Concurrent Session Limit........................................................................................................................ 65
Enabling the System to Clear Existing Sessions......................................................................................................... 65
Changing System Logging Settings..................................................................................................................................66
Display the Logging Buer and the Logging Conguration............................................................................................... 67
Conguring a UNIX Logging Facility Level........................................................................................................................ 67
Synchronizing Log Messages........................................................................................................................................... 68
Enabling Timestamp on Syslog Messages........................................................................................................................ 69
File Transfer Services....................................................................................................................................................... 69
Conguration Task List for File Transfer Services....................................................................................................... 69
Enabling the FTP Server.............................................................................................................................................70
Conguring FTP Server Parameters...........................................................................................................................70
Conguring FTP Client Parameters............................................................................................................................ 70
Terminal Lines....................................................................................................................................................................71
Denying and Permitting Access to a Terminal Line.......................................................................................................71
Conguring Login Authentication for Terminal Lines................................................................................................... 72
Setting Timeout for EXEC Privilege Mode........................................................................................................................73
Using Telnet to get to Another Network Device............................................................................................................... 73
Lock CONFIGURATION Mode..........................................................................................................................................74
Viewing the Conguration Lock Status.......................................................................................................................74
4










