Users Guide
Creating a Custom Privilege Level...........................................................................................................................57
Removing a Command from EXEC Mode.............................................................................................................. 57
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 57
Allowing Access to CONFIGURATION Mode Commands................................................................................... 58
Allowing Access to the Following Modes............................................................................................................... 58
Applying a Privilege Level to a Username...............................................................................................................59
Applying a Privilege Level to a Terminal Line......................................................................................................... 60
Configuring Logging........................................................................................................................................................ 60
Audit and Security Logs............................................................................................................................................60
Configuring Logging Format .................................................................................................................................. 62
Setting Up a Secure Connection to a Syslog Server............................................................................................ 62
Track Login Activity.........................................................................................................................................................64
Restrictions for Tracking Login Activity..................................................................................................................64
Configuring Login Activity Tracking........................................................................................................................ 64
Display Login Statistics............................................................................................................................................. 64
Limit Concurrent Login Sessions................................................................................................................................... 66
Restrictions for Limiting the Number of Concurrent Sessions............................................................................66
Configuring Concurrent Session Limit.................................................................................................................... 66
Enabling the System to Clear Existing Sessions.................................................................................................... 67
Enabling Secured CLI Mode........................................................................................................................................... 67
Log Messages in the Internal Buffer............................................................................................................................. 68
Configuration Task List for System Log Management.........................................................................................68
Disabling System Logging...............................................................................................................................................68
Sending System Messages to a Syslog Server............................................................................................................68
Configuring a UNIX System as a Syslog Server.................................................................................................... 69
Display the Logging Buffer and the Logging Configuration....................................................................................... 69
Changing System Logging Settings.............................................................................................................................. 70
Configuring a UNIX Logging Facility Level................................................................................................................... 70
Synchronizing Log Messages..........................................................................................................................................71
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
File Transfer Services......................................................................................................................................................72
Configuration Task List for File Transfer Services.................................................................................................72
Enabling the FTP Server........................................................................................................................................... 73
Configuring FTP Server Parameters....................................................................................................................... 73
Configuring FTP Client Parameters.........................................................................................................................73
Terminal Lines...................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................... 74
Configuring Login Authentication for Terminal Lines............................................................................................75
Setting Time Out of EXEC Privilege Mode...................................................................................................................75
Using Telnet to Access Another Network Device....................................................................................................... 76
Lock CONFIGURATION Mode.......................................................................................................................................77
Viewing the Configuration Lock Status...................................................................................................................77
Recovering from a Forgotten Password ......................................................................................................................78
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration....................................78
Recovering from a Failed Start...................................................................................................................................... 79
4
Contents