Concept Guide

Conguring Privilege Levels........................................................................................................................................... 59
Creating a Custom Privilege Level...........................................................................................................................60
Removing a Command from EXEC Mode.............................................................................................................. 60
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 60
Allowing Access to CONFIGURATION Mode Commands....................................................................................60
Allowing Access to Dierent Modes........................................................................................................................60
Applying a Privilege Level to a Username............................................................................................................... 62
Applying a Privilege Level to a Terminal Line.......................................................................................................... 62
Conguring Logging........................................................................................................................................................ 62
Audit and Security Logs............................................................................................................................................ 63
Conguring Logging Format ...................................................................................................................................64
Setting Up a Secure Connection to a Syslog Server.............................................................................................64
Log Messages in the Internal Buer..............................................................................................................................66
Conguration Task List for System Log Management..........................................................................................66
Disabling System Logging...............................................................................................................................................66
Sending System Messages to a Syslog Server............................................................................................................66
Conguring a UNIX System as a Syslog Server.....................................................................................................66
Track Login Activity..........................................................................................................................................................67
Restrictions for Tracking Login Activity...................................................................................................................67
Conguring Login Activity Tracking......................................................................................................................... 67
Display Login Statistics..............................................................................................................................................68
Limit Concurrent Login Sessions....................................................................................................................................69
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 69
Conguring Concurrent Session Limit.....................................................................................................................69
Enabling the System to Clear Existing Sessions.................................................................................................... 70
Enabling Secured CLI Mode............................................................................................................................................ 71
Changing System Logging Settings............................................................................................................................... 71
Display the Logging Buer and the Logging Conguration........................................................................................ 72
Conguring a UNIX Logging Facility Level.................................................................................................................... 72
Synchronizing Log Messages......................................................................................................................................... 73
Enabling Timestamp on Syslog Messages.................................................................................................................... 74
File Transfer Services.......................................................................................................................................................74
Conguration Task List for File Transfer Services..................................................................................................75
Enabling the FTP Server...........................................................................................................................................75
Conguring FTP Server Parameters....................................................................................................................... 75
Conguring FTP Client Parameters......................................................................................................................... 76
Terminal Lines................................................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line................................................................................................76
Conguring Login Authentication for Terminal Lines............................................................................................. 77
Setting Timeout for EXEC Privilege Mode................................................................................................................... 78
Using Telnet to get to Another Network Device..........................................................................................................79
Lock CONFIGURATION Mode....................................................................................................................................... 79
Viewing the Conguration Lock Status...................................................................................................................79
Reloading the system...................................................................................................................................................... 80
Restoring the Factory Default Settings......................................................................................................................... 81
4
Contents