Users Guide
Creating a Custom Privilege Level.................................................................................................................. 53
Removing a Command from EXEC Mode.................................................................................................... 54
Moving a Command from EXEC Privilege Mode to EXEC Mode............................................................. 54
Allowing Access to CONFIGURATION Mode Commands........................................................................ 54
Allowing Access to Different Modes.............................................................................................................. 54
Applying a Privilege Level to a Username..................................................................................................... 56
Applying a Privilege Level to a Terminal Line............................................................................................... 56
Configuring Logging................................................................................................................................................56
Audit and Security Logs..................................................................................................................................... 57
Configuring Logging Format ......................................................................................................................... 58
Setting Up a Secure Connection to a Syslog Server................................................................................... 59
Log Messages in the Internal Buffer.....................................................................................................................60
Configuration Task List for System Log Management............................................................................... 60
Disabling System Logging...................................................................................................................................... 60
Sending System Messages to a Syslog Server....................................................................................................60
Configuring a UNIX System as a Syslog Server.............................................................................................61
Track Login Activity.................................................................................................................................................. 61
Restrictions for Tracking Login Activity..........................................................................................................61
Configuring Login Activity Tracking................................................................................................................61
Display Login Statistics...................................................................................................................................... 62
Limit Concurrent Login Sessions.......................................................................................................................... 63
Restrictions for Limiting the Number of Concurrent Sessions.................................................................63
Configuring Concurrent Session Limit...........................................................................................................63
Enabling the System to Clear Existing Sessions...........................................................................................64
Changing System Logging Settings......................................................................................................................65
Display the Logging Buffer and the Logging Configuration........................................................................... 65
Configuring a UNIX Logging Facility Level......................................................................................................... 66
Synchronizing Log Messages.................................................................................................................................67
Enabling Timestamp on Syslog Messages...........................................................................................................67
File Transfer Services............................................................................................................................................... 68
Configuration Task List for File Transfer Services........................................................................................68
Enabling the FTP Server.................................................................................................................................... 68
Configuring FTP Server Parameters............................................................................................................... 69
Configuring FTP Client Parameters................................................................................................................69
Terminal Lines........................................................................................................................................................... 70
Denying and Permitting Access to a Terminal Line.................................................................................... 70
Configuring Login Authentication for Terminal Lines.................................................................................71
Setting Timeout for EXEC Privilege Mode...........................................................................................................72
Using Telnet to get to Another Network Device............................................................................................... 72
Lock CONFIGURATION Mode............................................................................................................................... 73
Viewing the Configuration Lock Status..........................................................................................................73
Reloading the system...............................................................................................................................................73
Restoring the Factory Default Settings................................................................................................................ 74
Important Points to Remember.......................................................................................................................74
Restoring Factory Default Environment Variables....................................................................................... 75
5 802.1X...................................................................................................................................................................... 77
9.10(0.1)
4










