Users Guide

Using HTTP for File Transfers........................................................................................................................................ 54
Verify Software Images Before Installation...................................................................................................................55
4 Management................................................................................................................................................57
Conguring Privilege Levels............................................................................................................................................57
Creating a Custom Privilege Level...........................................................................................................................58
Removing a Command from EXEC Mode.............................................................................................................. 58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................58
Allowing Access to CONFIGURATION Mode Commands....................................................................................58
Allowing Access to Dierent Modes........................................................................................................................58
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging........................................................................................................................................................ 60
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................63
Display the Logging Buer and the Logging Conguration..................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................64
Log Messages in the Internal Buer..............................................................................................................................65
Conguration Task List for System Log Management..........................................................................................65
Disabling System Logging...............................................................................................................................................65
Sending System Messages to a Syslog Server............................................................................................................65
Conguring a UNIX System as a Syslog Server.....................................................................................................66
Track Login Activity......................................................................................................................................................... 66
Restrictions for Tracking Login Activity.................................................................................................................. 66
Conguring Login Activity Tracking.........................................................................................................................66
Display Login Statistics..............................................................................................................................................67
Limit Concurrent Login Sessions....................................................................................................................................68
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 68
Conguring Concurrent Session Limit.....................................................................................................................68
Enabling the System to Clear Existing Sessions.................................................................................................... 69
Enabling Secured CLI Mode........................................................................................................................................... 70
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buer and the Logging Conguration.........................................................................................71
Conguring a UNIX Logging Facility Level.....................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................73
Conguration Task List for File Transfer Services.................................................................................................. 74
Enabling the FTP Server........................................................................................................................................... 74
Conguring FTP Server Parameters........................................................................................................................74
Conguring FTP Client Parameters......................................................................................................................... 75
Terminal Lines................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line................................................................................................75
Conguring Login Authentication for Terminal Lines.............................................................................................76
Setting Timeout for EXEC Privilege Mode....................................................................................................................77
Using Telnet to get to Another Network Device..........................................................................................................78
4
Contents