Users Guide

Conguring Privilege Levels............................................................................................................................................53
Creating a Custom Privilege Level...........................................................................................................................53
Removing a Command from EXEC Mode.............................................................................................................. 54
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................54
Allowing Access to CONFIGURATION Mode Commands....................................................................................54
Allowing Access to Dierent Modes........................................................................................................................54
Applying a Privilege Level to a Username............................................................................................................... 56
Applying a Privilege Level to a Terminal Line.......................................................................................................... 56
Conguring Logging........................................................................................................................................................ 56
Audit and Security Logs............................................................................................................................................ 57
Conguring Logging Format ...................................................................................................................................58
Setting Up a Secure Connection to a Syslog Server.............................................................................................58
Log Messages in the Internal Buer..............................................................................................................................60
Conguration Task List for System Log Management..........................................................................................60
Disabling System Logging...............................................................................................................................................60
Sending System Messages to a Syslog Server............................................................................................................60
Conguring a UNIX System as a Syslog Server.....................................................................................................60
Track Login Activity.......................................................................................................................................................... 61
Restrictions for Tracking Login Activity................................................................................................................... 61
Conguring Login Activity Tracking..........................................................................................................................61
Display Login Statistics..............................................................................................................................................62
Limit Concurrent Login Sessions....................................................................................................................................63
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 63
Conguring Concurrent Session Limit.....................................................................................................................63
Enabling the System to Clear Existing Sessions.................................................................................................... 64
Changing System Logging Settings...............................................................................................................................64
Display the Logging Buer and the Logging Conguration........................................................................................65
Conguring a UNIX Logging Facility Level....................................................................................................................66
Synchronizing Log Messages......................................................................................................................................... 67
Enabling Timestamp on Syslog Messages.................................................................................................................... 67
File Transfer Services.......................................................................................................................................................67
Conguration Task List for File Transfer Services..................................................................................................68
Enabling the FTP Server...........................................................................................................................................68
Conguring FTP Server Parameters....................................................................................................................... 68
Conguring FTP Client Parameters.........................................................................................................................69
Terminal Lines...................................................................................................................................................................69
Denying and Permitting Access to a Terminal Line................................................................................................69
Conguring Login Authentication for Terminal Lines.............................................................................................70
Setting Timeout for EXEC Privilege Mode.................................................................................................................... 71
Using Telnet to get to Another Network Device..........................................................................................................72
Lock CONFIGURATION Mode....................................................................................................................................... 72
Viewing the Conguration Lock Status...................................................................................................................73
Restoring the Factory Default Settings.........................................................................................................................73
Important Points to Remember................................................................................................................................73
Restoring Factory Default Environment Variables..................................................................................................74
Reloading the system...................................................................................................................................................... 75
4
Contents