Users Guide
Removing a Command from EXEC Mode.................................................................................................... 54
Moving a Command from EXEC Privilege Mode to EXEC Mode............................................................. 54
Allowing Access to CONFIGURATION Mode Commands.........................................................................55
Allowing Access to the Following Modes......................................................................................................55
Applying a Privilege Level to a Username..................................................................................................... 56
Applying a Privilege Level to a Terminal Line................................................................................................57
Configuring Logging................................................................................................................................................ 57
Audit and Security Logs..................................................................................................................................... 57
Configuring Logging Format ......................................................................................................................... 59
Setting Up a Secure Connection to a Syslog Server................................................................................... 59
Track Login Activity.................................................................................................................................................. 61
Restrictions for Tracking Login Activity..........................................................................................................61
Configuring Login Activity Tracking................................................................................................................61
Display Login Statistics.......................................................................................................................................61
Limit Concurrent Login Sessions.......................................................................................................................... 63
Restrictions for Limiting the Number of Concurrent Sessions.................................................................63
Configuring Concurrent Session Limit...........................................................................................................63
Enabling the System to Clear Existing Sessions...........................................................................................63
Log Messages in the Internal Buffer.....................................................................................................................64
Configuration Task List for System Log Management............................................................................... 64
Disabling System Logging...................................................................................................................................... 65
Sending System Messages to a Syslog Server....................................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................................ 65
Display the Logging Buffer and the Logging Configuration........................................................................... 66
Changing System Logging Settings......................................................................................................................66
Configuring a UNIX Logging Facility Level..........................................................................................................67
Synchronizing Log Messages................................................................................................................................ 68
Enabling Timestamp on Syslog Messages.......................................................................................................... 68
File Transfer Services............................................................................................................................................... 69
Configuration Task List for File Transfer Services........................................................................................69
Enabling the FTP Server.................................................................................................................................... 69
Configuring FTP Server Parameters................................................................................................................70
Configuring FTP Client Parameters................................................................................................................ 70
Terminal Lines............................................................................................................................................................71
Denying and Permitting Access to a Terminal Line.....................................................................................71
Configuring Login Authentication for Terminal Lines.................................................................................71
Setting Time Out of EXEC Privilege Mode...........................................................................................................72
Using Telnet to Access Another Network Device..............................................................................................73
Lock CONFIGURATION Mode............................................................................................................................... 73
Viewing the Configuration Lock Status..........................................................................................................73
Recovering from a Forgotten Password .............................................................................................................74
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.....................75
Recovering from a Failed Start...............................................................................................................................75
Restoring Factory-Default Settings.......................................................................................................................75
Important Point to Remember.........................................................................................................................76
Restoring Factory-Default Boot Environment Variables............................................................................76
Using Hashes to Verify Software Images Before Installation...........................................................................77
Version 9.10(0.1)
4