Deployment Guide
Synchronizing Log Messages......................................................................................................................................... 76
Enabling Timestamp on Syslog Messages.................................................................................................................... 77
Enabling Secure Management Mode.............................................................................................................................77
Enabling Secured CLI Mode............................................................................................................................................78
File Transfer Services.......................................................................................................................................................78
Conguration Task List for File Transfer Services..................................................................................................78
Enabling the FTP Server........................................................................................................................................... 78
Conguring FTP Server Parameters........................................................................................................................79
Conguring FTP Client Parameters......................................................................................................................... 79
Terminal Lines...................................................................................................................................................................80
Denying and Permitting Access to a Terminal Line................................................................................................80
Conguring Login Authentication for Terminal Lines.............................................................................................80
Setting Time Out of EXEC Privilege Mode................................................................................................................... 81
Using Telnet to get to Another Network Device..........................................................................................................82
Lock CONFIGURATION Mode....................................................................................................................................... 82
Viewing the Conguration Lock Status...................................................................................................................83
Limit Concurrent Login Sessions....................................................................................................................................83
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 83
Conguring Concurrent Session Limit.....................................................................................................................84
Enabling the System to Clear Existing Sessions.................................................................................................... 84
Track Login Activity......................................................................................................................................................... 85
Restrictions for Tracking Login Activity.................................................................................................................. 85
Conguring Login Activity Tracking.........................................................................................................................85
Display Login Statistics..............................................................................................................................................86
Recovering from a Forgotten Password........................................................................................................................87
Recovering from a Forgotten Enable Password...........................................................................................................88
Recovering from a Failed Start...................................................................................................................................... 89
6 802.1X......................................................................................................................................................... 90
The Port-Authentication Process.................................................................................................................................. 93
EAP over RADIUS......................................................................................................................................................94
Conguring 802.1X...........................................................................................................................................................94
Related Conguration Tasks..................................................................................................................................... 94
Important Points to Remember......................................................................................................................................95
Enabling 802.1X................................................................................................................................................................ 95
Conguring Request Identity Re-Transmissions.....................................................................................................96
Conguring a Quiet Period after a Failed Authentication......................................................................................97
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 98
Re-Authenticating a Port................................................................................................................................................99
Conguring Timeouts......................................................................................................................................................99
Conguring Dynamic VLAN Assignment with Port Authentication.........................................................................100
Guest and Authentication-Fail VLANs....................................................................................................................101
Conguring a Guest VLAN......................................................................................................................................102
Conguring an Authentication-Fail VLAN............................................................................................................. 102
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................104
Contents
5