Users Guide

Conguring Privilege Levels........................................................................................................................................... 56
Creating a Custom Privilege Level........................................................................................................................... 57
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................57
Allowing Access to CONFIGURATION Mode Commands.................................................................................... 57
Allowing Access to Dierent Modes........................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................... 59
Applying a Privilege Level to a Terminal Line.......................................................................................................... 59
Conguring Logging........................................................................................................................................................ 59
Audit and Security Logs............................................................................................................................................60
Conguring Logging Format ................................................................................................................................... 61
Setting Up a Secure Connection to a Syslog Server............................................................................................. 61
Log Messages in the Internal Buer..............................................................................................................................63
Conguration Task List for System Log Management.......................................................................................... 63
Disabling System Logging............................................................................................................................................... 63
Sending System Messages to a Syslog Server............................................................................................................63
Conguring a UNIX System as a Syslog Server.....................................................................................................63
Track Login Activity......................................................................................................................................................... 64
Restrictions for Tracking Login Activity...................................................................................................................64
Conguring Login Activity Tracking......................................................................................................................... 64
Display Login Statistics..............................................................................................................................................65
Limit Concurrent Login Sessions....................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 66
Conguring Concurrent Session Limit.....................................................................................................................66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode........................................................................................................................................... 68
Changing System Logging Settings...............................................................................................................................68
Display the Logging Buer and the Logging Conguration........................................................................................69
Conguring a UNIX Logging Facility Level....................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages.....................................................................................................................71
File Transfer Services....................................................................................................................................................... 71
Conguration Task List for File Transfer Services..................................................................................................72
Enabling the FTP Server........................................................................................................................................... 72
Conguring FTP Server Parameters........................................................................................................................72
Conguring FTP Client Parameters......................................................................................................................... 73
Terminal Lines................................................................................................................................................................... 73
Denying and Permitting Access to a Terminal Line................................................................................................ 73
Conguring Login Authentication for Terminal Lines............................................................................................. 74
Setting Timeout for EXEC Privilege Mode................................................................................................................... 75
Using Telnet to get to Another Network Device..........................................................................................................76
Lock CONFIGURATION Mode....................................................................................................................................... 76
Viewing the Conguration Lock Status...................................................................................................................76
Reloading the system.......................................................................................................................................................77
Restoring the Factory Default Settings.........................................................................................................................78
4
Contents