Administrator Guide
Log Messages in the Internal Buffer.....................................................................................82
Configuration Task List for System Log Management............................................... 82
Disabling System Logging...................................................................................................... 82
Sending System Messages to a Syslog Server....................................................................83
Configuring a UNIX System as a Syslog Server............................................................83
Changing System Logging Settings......................................................................................83
Display the Logging Buffer and the Logging Configuration...........................................84
Configuring a UNIX Logging Facility Level..........................................................................85
Synchronizing Log Messages................................................................................................ 86
Enabling Timestamp on Syslog Messages.......................................................................... 87
Enabling Secure Management Mode................................................................................... 87
File Transfer Services...............................................................................................................88
Configuration Task List for File Transfer Services....................................................... 88
Enabling the FTP Server.................................................................................................... 88
Configuring FTP Server Parameters............................................................................... 89
Configuring FTP Client Parameters................................................................................89
Terminal Lines...........................................................................................................................90
Denying and Permitting Access to a Terminal Line....................................................90
Configuring Login Authentication for Terminal Lines.................................................91
Setting Time Out of EXEC Privilege Mode.......................................................................... 92
Using Telnet to get to Another Network Device............................................................... 92
Lock CONFIGURATION Mode...............................................................................................93
Viewing the Configuration Lock Status......................................................................... 93
Limit Concurrent Login Sessions..........................................................................................94
Restrictions for Limiting the Number of Concurrent Sessions.................................94
Configuring Concurrent Session Limit.......................................................................... 95
Enabling the System to Clear Existing Sessions...........................................................95
Track Login Activity..................................................................................................................96
Restrictions for Tracking Login Activity......................................................................... 96
Configuring Login Activity Tracking............................................................................... 96
Display Login Statistics...................................................................................................... 97
Recovering from a Forgotten Password............................................................................. 99
Recovering from a Forgotten Enable Password..............................................................100
Recovering from a Failed Start............................................................................................100
6 802.1X.....................................................................................................................................102
The Port-Authentication Process....................................................................................... 105
EAP over RADIUS.............................................................................................................. 107
Configuring 802.1X................................................................................................................ 107
Related Configuration Tasks..........................................................................................108
Important Points to Remember.......................................................................................... 108
Enabling 802.1X...................................................................................................................... 109
Configuration Guide
5