Users Guide

Configuring Privilege Levels........................................................................................................................................... 56
Creating a Custom Privilege Level...........................................................................................................................57
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 57
Allowing Access to CONFIGURATION Mode Commands....................................................................................57
Allowing Access to Different Modes....................................................................................................................... 57
Applying a Privilege Level to a Username...............................................................................................................59
Applying a Privilege Level to a Terminal Line......................................................................................................... 59
Configuring Logging........................................................................................................................................................ 59
Audit and Security Logs............................................................................................................................................60
Configuring Logging Format ................................................................................................................................... 61
Setting Up a Secure Connection to a Syslog Server.............................................................................................61
Log Messages in the Internal Buffer............................................................................................................................. 63
Configuration Task List for System Log Management.........................................................................................63
Disabling System Logging...............................................................................................................................................63
Sending System Messages to a Syslog Server............................................................................................................63
Configuring a UNIX System as a Syslog Server.................................................................................................... 63
Track Login Activity.........................................................................................................................................................64
Restrictions for Tracking Login Activity..................................................................................................................64
Configuring Login Activity Tracking........................................................................................................................ 64
Display Login Statistics............................................................................................................................................. 65
Limit Concurrent Login Sessions................................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................66
Configuring Concurrent Session Limit.................................................................................................................... 66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode........................................................................................................................................... 68
Changing System Logging Settings.............................................................................................................................. 68
Display the Logging Buffer and the Logging Configuration....................................................................................... 69
Configuring a UNIX Logging Facility Level................................................................................................................... 69
Synchronizing Log Messages.........................................................................................................................................70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services.......................................................................................................................................................71
Configuration Task List for File Transfer Services.................................................................................................72
Enabling the FTP Server........................................................................................................................................... 72
Configuring FTP Server Parameters....................................................................................................................... 72
Configuring FTP Client Parameters.........................................................................................................................73
Terminal Lines...................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line............................................................................................... 73
Configuring Login Authentication for Terminal Lines............................................................................................ 74
Setting Timeout for EXEC Privilege Mode...................................................................................................................75
Using Telnet to get to Another Network Device.........................................................................................................76
Lock CONFIGURATION Mode.......................................................................................................................................76
Viewing the Configuration Lock Status.................................................................................................................. 76
Reloading the system...................................................................................................................................................... 77
Restoring the Factory Default Settings........................................................................................................................ 78
4
Contents