White Papers
Conguring Privilege Levels............................................................................................................................................57
Creating a Custom Privilege Level...........................................................................................................................58
Removing a Command from EXEC Mode.............................................................................................................. 58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................58
Allowing Access to CONFIGURATION Mode Commands....................................................................................58
Allowing Access to Dierent Modes........................................................................................................................58
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging........................................................................................................................................................ 60
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................62
Setting Up a Secure Connection to a Syslog Server.............................................................................................62
Log Messages in the Internal Buer..............................................................................................................................64
Conguration Task List for System Log Management.......................................................................................... 64
Disabling System Logging............................................................................................................................................... 64
Sending System Messages to a Syslog Server............................................................................................................64
Conguring a UNIX System as a Syslog Server.....................................................................................................64
Track Login Activity......................................................................................................................................................... 65
Restrictions for Tracking Login Activity.................................................................................................................. 65
Conguring Login Activity Tracking.........................................................................................................................65
Display Login Statistics..............................................................................................................................................66
Limit Concurrent Login Sessions....................................................................................................................................67
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................67
Conguring Concurrent Session Limit.....................................................................................................................67
Enabling the System to Clear Existing Sessions.................................................................................................... 68
Enabling Secured CLI Mode........................................................................................................................................... 69
Changing System Logging Settings.............................................................................................................................. 69
Display the Logging Buer and the Logging Conguration........................................................................................ 70
Conguring a UNIX Logging Facility Level....................................................................................................................70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
File Transfer Services.......................................................................................................................................................72
Conguration Task List for File Transfer Services..................................................................................................73
Enabling the FTP Server........................................................................................................................................... 73
Conguring FTP Server Parameters........................................................................................................................73
Conguring FTP Client Parameters......................................................................................................................... 74
Terminal Lines................................................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line................................................................................................ 74
Conguring Login Authentication for Terminal Lines.............................................................................................75
Setting Timeout for EXEC Privilege Mode................................................................................................................... 76
Using Telnet to get to Another Network Device.......................................................................................................... 77
Lock CONFIGURATION Mode....................................................................................................................................... 77
Viewing the Conguration Lock Status................................................................................................................... 77
Reloading the system...................................................................................................................................................... 78
Restoring the Factory Default Settings.........................................................................................................................79
4
Contents










