Service Manual

Creating a Custom Privilege Level.............................................................................................................................. 52
Removing a Command from EXEC Mode...................................................................................................................52
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................52
Allowing Access to CONFIGURATION Mode Commands...........................................................................................52
Allowing Access to the Following Modes....................................................................................................................53
Applying a Privilege Level to a Username................................................................................................................... 54
Applying a Privilege Level to a Terminal Line...............................................................................................................55
Conguring Logging......................................................................................................................................................... 55
Audit and Security Logs............................................................................................................................................. 55
Conguring Logging Format ..................................................................................................................................... 57
Setting Up a Secure Connection to a Syslog Server...................................................................................................58
Log Messages in the Internal Buer................................................................................................................................. 59
Conguration Task List for System Log Management................................................................................................ 59
Disabling System Logging.................................................................................................................................................59
Sending System Messages to a Syslog Server................................................................................................................. 59
Conguring a UNIX System as a Syslog Server..........................................................................................................59
Changing System Logging Settings..................................................................................................................................60
Display the Logging Buer and the Logging Conguration................................................................................................61
Conguring a UNIX Logging Facility Level.........................................................................................................................61
Synchronizing Log Messages........................................................................................................................................... 62
Enabling Timestamp on Syslog Messages........................................................................................................................ 63
File Transfer Services....................................................................................................................................................... 63
Conguration Task List for File Transfer Services....................................................................................................... 63
Enabling the FTP Server............................................................................................................................................ 64
Conguring FTP Server Parameters...........................................................................................................................64
Conguring FTP Client Parameters............................................................................................................................ 64
Terminal Lines...................................................................................................................................................................65
Denying and Permitting Access to a Terminal Line......................................................................................................65
Conguring Login Authentication for Terminal Lines...................................................................................................66
Setting Time Out of EXEC Privilege Mode.......................................................................................................................66
Using Telnet to get to Another Network Device............................................................................................................... 67
Lock CONFIGURATION Mode......................................................................................................................................... 68
Viewing the Conguration Lock Status.......................................................................................................................68
Restoring the Factory Default Settings............................................................................................................................ 68
Important Points to Remember.................................................................................................................................. 69
Restoring Factory Default Environment Variables.......................................................................................................69
5 802.1X............................................................................................................................71
The Port-Authentication Process..................................................................................................................................... 72
EAP over RADIUS.......................................................................................................................................................73
Conguring 802.1X............................................................................................................................................................74
Related Conguration Tasks........................................................................................................................................74
Important Points to Remember.........................................................................................................................................74
Enabling 802.1X................................................................................................................................................................ 75
Conguring Request Identity Re-Transmissions................................................................................................................ 76
Conguring a Quiet Period after a Failed Authentication.............................................................................................77
4