Administrator Guide
Applying a Privilege Level to a Username...................................................................................................................55
Applying a Privilege Level to a Terminal Line............................................................................................................. 55
Configuring Logging............................................................................................................................................................55
Audit and Security Logs................................................................................................................................................56
Configuring Logging Format .................................................................................................................................57
Setting Up a Secure Connection to a Syslog Server.......................................................................................57
Track Login Activity............................................................................................................................................................ 58
Restrictions for Tracking Login Activity..................................................................................................................... 59
Configuring Login Activity Tracking............................................................................................................................ 59
Display Login Statistics................................................................................................................................................. 59
Limit Concurrent Login Sessions........................................................................................................................................61
Restrictions for Limiting the Number of Concurrent Sessions.................................................................................61
Configuring Concurrent Session Limit.........................................................................................................................61
Enabling the System to Clear Existing Sessions.........................................................................................................61
Enabling Secured CLI Mode...............................................................................................................................................62
Log Messages in the Internal Buffer.................................................................................................................................62
Disabling System Logging...................................................................................................................................................62
Sending System Messages to a Syslog Server............................................................................................................... 63
Configuring a UNIX System as a Syslog Server........................................................................................................ 63
Display the Logging Buffer and the Logging Configuration...........................................................................................63
Changing System Logging Settings..................................................................................................................................64
Configuring a UNIX Logging Facility Level.......................................................................................................................64
Synchronizing Log Messages............................................................................................................................................ 65
Enabling Timestamp on Syslog Messages....................................................................................................................... 66
File Transfer Services..........................................................................................................................................................67
Enabling the FTP Server...............................................................................................................................................67
Configuring FTP Server Parameters...........................................................................................................................67
Configuring FTP Client Parameters............................................................................................................................ 68
Terminal Lines...................................................................................................................................................................... 68
Denying and Permitting Access to a Terminal Line...................................................................................................68
Configuring Login Authentication for Terminal Lines................................................................................................69
Setting Time Out of EXEC Privilege Mode...................................................................................................................... 70
Using Telnet to Access Another Network Device...........................................................................................................70
Lock CONFIGURATION Mode.......................................................................................................................................... 70
LPC Bus Quality Degradation..............................................................................................................................................71
Recovering from a Forgotten Password ......................................................................................................................... 72
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration........................................73
Recovering from a Failed Start..........................................................................................................................................73
Restoring Factory-Default Settings.................................................................................................................................. 73
Restoring Factory-Default Boot Environment Variables.......................................................................................... 74
Using Hashes to Verify Software Images Before Installation............................................................................ 75
Verifying System Images on C9010 Components........................................................................................................... 76
When System Images on C9010 Components Do Not Match.................................................................................77
Manually Resetting the System Image on a C9010 Component............................................................................. 77
Logging in to the Virtual Console of a C9010 Component....................................................................................... 77
Booting the C9010 from an Image on a Network Server......................................................................................... 78
Configuring C9010 Components to Boot from the RPM CP Image.......................................................................78
Viewing the Reason for Last System Reboot..................................................................................................................79
5 802.1X.......................................................................................................................................80
4
Contents