Concept Guide

Table Of Contents
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
Enabling Secure Management Mode............................................................................................................................ 79
Enabling Secured CLI Mode........................................................................................................................................... 79
File Transfer Services...................................................................................................................................................... 80
Conguration Task List for File Transfer Services..................................................................................................80
Enabling the FTP Server...........................................................................................................................................80
Conguring FTP Server Parameters....................................................................................................................... 80
Conguring FTP Client Parameters..........................................................................................................................81
Terminal Lines....................................................................................................................................................................81
Denying and Permitting Access to a Terminal Line.................................................................................................81
Conguring Login Authentication for Terminal Lines.............................................................................................82
Setting Time Out of EXEC Privilege Mode...................................................................................................................83
Using Telnet to get to Another Network Device..........................................................................................................83
Lock CONFIGURATION Mode....................................................................................................................................... 84
Viewing the Conguration Lock Status...................................................................................................................84
Limit Concurrent Login Sessions....................................................................................................................................85
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 85
Conguring Concurrent Session Limit.....................................................................................................................85
Enabling the System to Clear Existing Sessions.................................................................................................... 85
Track Login Activity......................................................................................................................................................... 86
Restrictions for Tracking Login Activity...................................................................................................................86
Conguring Login Activity Tracking.........................................................................................................................86
Display Login Statistics.............................................................................................................................................. 87
Recovering from a Forgotten Password....................................................................................................................... 88
Recovering from a Forgotten Enable Password...........................................................................................................89
Recovering from a Failed Start...................................................................................................................................... 90
6 802.1X.......................................................................................................................................................... 91
The Port-Authentication Process.................................................................................................................................. 94
EAP over RADIUS......................................................................................................................................................95
Conguring 802.1X...........................................................................................................................................................95
Related Conguration Tasks..................................................................................................................................... 95
Important Points to Remember......................................................................................................................................96
Enabling 802.1X................................................................................................................................................................ 96
Conguring Request Identity Re-Transmissions.....................................................................................................97
Conguring a Quiet Period after a Failed Authentication..................................................................................... 98
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 99
Re-Authenticating a Port.............................................................................................................................................. 100
Conguring Timeouts.................................................................................................................................................... 100
Conguring Dynamic VLAN Assignment with Port Authentication..........................................................................101
Guest and Authentication-Fail VLANs...................................................................................................................102
Conguring a Guest VLAN......................................................................................................................................103
Conguring an Authentication-Fail VLAN............................................................................................................. 103
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM).................................. 105
Contents
5