Administrator Guide
Allowing Access to Different Modes...........................................................................................................................54
Applying a Privilege Level to a Username...................................................................................................................55
Applying a Privilege Level to a Terminal Line............................................................................................................. 55
Configuring Logging............................................................................................................................................................56
Audit and Security Logs................................................................................................................................................56
Configuring Logging Format .................................................................................................................................57
Setting Up a Secure Connection to a Syslog Server.......................................................................................58
Log Messages in the Internal Buffer.................................................................................................................................59
Disabling System Logging.................................................................................................................................................. 59
Sending System Messages to a Syslog Server............................................................................................................... 59
Configuring a UNIX System as a Syslog Server........................................................................................................ 59
Track Login Activity............................................................................................................................................................ 60
Restrictions for Tracking Login Activity..................................................................................................................... 60
Configuring Login Activity Tracking............................................................................................................................ 60
Display Login Statistics................................................................................................................................................. 60
Limit Concurrent Login Sessions.......................................................................................................................................62
Restrictions for Limiting the Number of Concurrent Sessions................................................................................62
Configuring Concurrent Session Limit........................................................................................................................ 62
Enabling the System to Clear Existing Sessions........................................................................................................62
Enabling Secured CLI Mode...............................................................................................................................................63
Changing System Logging Settings..................................................................................................................................63
Display the Logging Buffer and the Logging Configuration...........................................................................................64
Configuring a UNIX Logging Facility Level.......................................................................................................................65
Synchronizing Log Messages............................................................................................................................................ 66
Enabling Timestamp on Syslog Messages....................................................................................................................... 66
File Transfer Services......................................................................................................................................................... 69
Enabling the FTP Server...............................................................................................................................................69
Configuring FTP Server Parameters...........................................................................................................................69
Configuring FTP Client Parameters............................................................................................................................ 70
Terminal Lines...................................................................................................................................................................... 70
Denying and Permitting Access to a Terminal Line...................................................................................................70
Configuring Login Authentication for Terminal Lines.................................................................................................71
Setting Timeout for EXEC Privilege Mode.......................................................................................................................72
Using Telnet to get to Another Network Device.............................................................................................................72
Lock CONFIGURATION Mode...........................................................................................................................................73
Reloading the system..........................................................................................................................................................74
Restoring the Factory Default Settings............................................................................................................................74
Restoring Factory Default Environment Variables.................................................................................................... 75
Viewing the Reason for Last System Reboot..................................................................................................................76
Disabling Syslog Messages for SNMP Authentication Failure Events..........................................................................76
5 802.1X....................................................................................................................................... 77
Port-Authentication Process............................................................................................................................................. 78
EAP over RADIUS..........................................................................................................................................................79
Configuring 802.1X.............................................................................................................................................................. 79
Important Points to Remember.........................................................................................................................................80
Enabling 802.1X................................................................................................................................................................... 80
Configuring dot1x Profile ....................................................................................................................................................81
Configuring MAC addresses for a do1x Profile................................................................................................................82
Configuring the Static MAB and MAB Profile ................................................................................................................ 82
4
Contents










