Concept Guide
Synchronizing Log Messages......................................................................................................................................... 79
Enabling Timestamp on Syslog Messages.................................................................................................................... 79
Enabling Secure Management Mode............................................................................................................................ 80
Enabling Secured CLI Mode........................................................................................................................................... 80
File Transfer Services....................................................................................................................................................... 81
Conguration Task List for File Transfer Services...................................................................................................81
Enabling the FTP Server............................................................................................................................................81
Conguring FTP Server Parameters........................................................................................................................ 81
Conguring FTP Client Parameters.........................................................................................................................82
Terminal Lines................................................................................................................................................................... 82
Denying and Permitting Access to a Terminal Line................................................................................................82
Conguring Login Authentication for Terminal Lines.............................................................................................83
Setting Time Out of EXEC Privilege Mode...................................................................................................................84
Using Telnet to get to Another Network Device..........................................................................................................84
Lock CONFIGURATION Mode.......................................................................................................................................85
Viewing the Conguration Lock Status...................................................................................................................85
Limit Concurrent Login Sessions....................................................................................................................................86
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 86
Conguring Concurrent Session Limit.....................................................................................................................86
Enabling the System to Clear Existing Sessions.................................................................................................... 86
Track Login Activity..........................................................................................................................................................87
Restrictions for Tracking Login Activity...................................................................................................................87
Conguring Login Activity Tracking.........................................................................................................................88
Display Login Statistics..............................................................................................................................................88
Recovering from a Forgotten Password....................................................................................................................... 90
Recovering from a Forgotten Enable Password.......................................................................................................... 90
Recovering from a Failed Start....................................................................................................................................... 91
6 802.1X..........................................................................................................................................................92
The Port-Authentication Process.................................................................................................................................. 95
EAP over RADIUS......................................................................................................................................................96
Conguring 802.1X...........................................................................................................................................................96
Related Conguration Tasks..................................................................................................................................... 96
Important Points to Remember......................................................................................................................................97
Enabling 802.1X.................................................................................................................................................................97
Conguring Request Identity Re-Transmissions.....................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs...................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................106
Contents
5