Users Guide
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 79
Enabling Secure Management Mode............................................................................................................................ 79
Enabling Secured CLI Mode........................................................................................................................................... 80
File Transfer Services...................................................................................................................................................... 80
Conguration Task List for File Transfer Services..................................................................................................80
Enabling the FTP Server...........................................................................................................................................80
Conguring FTP Server Parameters........................................................................................................................ 81
Conguring FTP Client Parameters..........................................................................................................................81
Terminal Lines................................................................................................................................................................... 82
Denying and Permitting Access to a Terminal Line................................................................................................82
Conguring Login Authentication for Terminal Lines.............................................................................................82
Setting Time Out of EXEC Privilege Mode...................................................................................................................83
Using Telnet to get to Another Network Device..........................................................................................................84
Lock CONFIGURATION Mode....................................................................................................................................... 84
Viewing the Conguration Lock Status...................................................................................................................85
Limit Concurrent Login Sessions....................................................................................................................................85
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 85
Conguring Concurrent Session Limit.....................................................................................................................85
Enabling the System to Clear Existing Sessions.................................................................................................... 86
Track Login Activity..........................................................................................................................................................87
Restrictions for Tracking Login Activity...................................................................................................................87
Conguring Login Activity Tracking......................................................................................................................... 87
Display Login Statistics.............................................................................................................................................. 87
Recovering from a Forgotten Password....................................................................................................................... 89
Recovering from a Forgotten Enable Password.......................................................................................................... 90
Recovering from a Failed Start...................................................................................................................................... 90
6 802.1X..........................................................................................................................................................92
The Port-Authentication Process.................................................................................................................................. 95
EAP over RADIUS......................................................................................................................................................96
Conguring 802.1X...........................................................................................................................................................96
Related Conguration Tasks..................................................................................................................................... 96
Important Points to Remember......................................................................................................................................97
Enabling 802.1X.................................................................................................................................................................97
Conguring Request Identity Re-Transmissions.....................................................................................................98
Conguring a Quiet Period after a Failed Authentication..................................................................................... 99
Forcibly Authorizing or Unauthorizing a Port..............................................................................................................100
Re-Authenticating a Port............................................................................................................................................... 101
Conguring Timeouts..................................................................................................................................................... 101
Conguring Dynamic VLAN Assignment with Port Authentication......................................................................... 102
Guest and Authentication-Fail VLANs...................................................................................................................103
Conguring a Guest VLAN......................................................................................................................................104
Conguring an Authentication-Fail VLAN............................................................................................................. 104
7 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)...................................106
Contents
5