Users Guide

Verify Software Images Before Installation......................................................................................................... 53
4 Management.......................................................................................................................................................... 55
Configuring Privilege Levels...................................................................................................................................55
Creating a Custom Privilege Level.................................................................................................................. 55
Removing a Command from EXEC Mode.................................................................................................... 56
Moving a Command from EXEC Privilege Mode to EXEC Mode............................................................. 56
Allowing Access to CONFIGURATION Mode Commands........................................................................ 56
Allowing Access to Different Modes.............................................................................................................. 56
Applying a Privilege Level to a Username..................................................................................................... 58
Applying a Privilege Level to a Terminal Line............................................................................................... 58
Configuring Logging................................................................................................................................................58
Audit and Security Logs.....................................................................................................................................59
Configuring Logging Format ......................................................................................................................... 60
Display the Logging Buffer and the Logging Configuration......................................................................61
Setting Up a Secure Connection to a Syslog Server...................................................................................62
Log Messages in the Internal Buffer..................................................................................................................... 63
Configuration Task List for System Log Management............................................................................... 63
Disabling System Logging...................................................................................................................................... 63
Sending System Messages to a Syslog Server....................................................................................................63
Configuring a UNIX System as a Syslog Server............................................................................................64
Track Login Activity..................................................................................................................................................64
Restrictions for Tracking Login Activity......................................................................................................... 64
Configuring Login Activity Tracking............................................................................................................... 64
Display Login Statistics...................................................................................................................................... 65
Limit Concurrent Login Sessions.......................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions.................................................................66
Configuring Concurrent Session Limit.......................................................................................................... 66
Enabling the System to Clear Existing Sessions........................................................................................... 67
Changing System Logging Settings......................................................................................................................68
Display the Logging Buffer and the Logging Configuration........................................................................... 68
Configuring a UNIX Logging Facility Level......................................................................................................... 69
Synchronizing Log Messages.................................................................................................................................70
Enabling Timestamp on Syslog Messages.......................................................................................................... 70
File Transfer Services................................................................................................................................................71
Configuration Task List for File Transfer Services........................................................................................ 71
Enabling the FTP Server..................................................................................................................................... 71
Configuring FTP Server Parameters................................................................................................................72
Configuring FTP Client Parameters................................................................................................................ 72
Terminal Lines........................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line.....................................................................................73
Configuring Login Authentication for Terminal Lines................................................................................ 74
Setting Timeout for EXEC Privilege Mode...........................................................................................................75
Using Telnet to get to Another Network Device............................................................................................... 75
Lock CONFIGURATION Mode...............................................................................................................................76
Viewing the Configuration Lock Status..........................................................................................................76
Recovering from a Forgotten Password..............................................................................................................76
9.10(0.0)
4