Administrator Guide

Table Of Contents
Removing a Command from EXEC Mode..................................................................................................................56
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 56
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 56
Allowing Access to Different Modes...........................................................................................................................56
Applying a Privilege Level to a Username...................................................................................................................57
Applying a Privilege Level to a Terminal Line............................................................................................................. 57
Configuring Logging............................................................................................................................................................58
Audit and Security Logs................................................................................................................................................58
Configuring Logging Format ................................................................................................................................ 59
Setting Up a Secure Connection to a Syslog Server.......................................................................................60
Log Messages in the Internal Buffer..................................................................................................................................61
Disabling System Logging................................................................................................................................................... 61
Sending System Messages to a Syslog Server................................................................................................................ 61
Configuring a UNIX System as a Syslog Server.........................................................................................................61
Track Login Activity............................................................................................................................................................ 62
Restrictions for Tracking Login Activity......................................................................................................................62
Configuring Login Activity Tracking............................................................................................................................ 62
Display Login Statistics................................................................................................................................................. 62
Limit Concurrent Login Sessions.......................................................................................................................................64
Restrictions for Limiting the Number of Concurrent Sessions................................................................................64
Configuring Concurrent Session Limit........................................................................................................................ 64
Enabling the System to Clear Existing Sessions........................................................................................................64
Enabling Secured CLI Mode...............................................................................................................................................65
Changing System Logging Settings..................................................................................................................................65
Display the Logging Buffer and the Logging Configuration...........................................................................................66
Configuring a UNIX Logging Facility Level....................................................................................................................... 67
Synchronizing Log Messages.............................................................................................................................................67
Enabling Timestamp on Syslog Messages........................................................................................................................68
File Transfer Services..........................................................................................................................................................70
Enabling the FTP Server................................................................................................................................................71
Configuring FTP Server Parameters............................................................................................................................71
Configuring FTP Client Parameters............................................................................................................................. 71
Terminal Lines...................................................................................................................................................................... 72
Denying and Permitting Access to a Terminal Line................................................................................................... 72
Configuring Login Authentication for Terminal Lines................................................................................................73
Setting Timeout for EXEC Privilege Mode.......................................................................................................................74
Using Telnet to get to Another Network Device.............................................................................................................74
Lock CONFIGURATION Mode.......................................................................................................................................... 75
LPC Bus Quality Degradation.............................................................................................................................................75
Restoring the Factory Default Settings............................................................................................................................76
Restoring Factory Default Environment Variables.....................................................................................................77
Reloading the system..........................................................................................................................................................78
Viewing the Reason for Last System Reboot..................................................................................................................78
5 802.1X.......................................................................................................................................80
Port-Authentication Process..............................................................................................................................................81
EAP over RADIUS..........................................................................................................................................................82
Configuring 802.1X..............................................................................................................................................................82
Important Points to Remember.........................................................................................................................................83
Enabling 802.1X....................................................................................................................................................................83
4
Contents