Users Guide

Verify Software Images Before Installation.........................................................................................................54
Using HTTP for File Transfers.................................................................................................................................55
4 Management...........................................................................................................................................................57
Configuring Privilege Levels................................................................................................................................... 57
Creating a Custom Privilege Level.................................................................................................................. 57
Removing a Command from EXEC Mode.................................................................................................... 58
Moving a Command from EXEC Privilege Mode to EXEC Mode............................................................. 58
Allowing Access to CONFIGURATION Mode Commands........................................................................ 58
Allowing Access to Different Modes.............................................................................................................. 58
Applying a Privilege Level to a Username..................................................................................................... 60
Applying a Privilege Level to a Terminal Line............................................................................................... 60
Configuring Logging............................................................................................................................................... 60
Audit and Security Logs..................................................................................................................................... 61
Configuring Logging Format ......................................................................................................................... 62
Display the Logging Buffer and the Logging Configuration..................................................................... 63
Setting Up a Secure Connection to a Syslog Server...................................................................................64
Sending System Messages to a Syslog Server.............................................................................................. 65
Track Login Activity..................................................................................................................................................65
Restrictions for Tracking Login Activity......................................................................................................... 65
Configuring Login Activity Tracking............................................................................................................... 65
Display Login Statistics...................................................................................................................................... 66
Limit Concurrent Login Sessions.......................................................................................................................... 67
Restrictions for Limiting the Number of Concurrent Sessions.................................................................67
Configuring Concurrent Session Limit...........................................................................................................67
Enabling the System to Clear Existing Sessions...........................................................................................68
Log Messages in the Internal Buffer.....................................................................................................................69
Configuration Task List for System Log Management............................................................................... 69
Disabling System Logging...................................................................................................................................... 69
Sending System Messages to a Syslog Server....................................................................................................69
Configuring a UNIX System as a Syslog Server............................................................................................69
Changing System Logging Settings......................................................................................................................70
Display the Logging Buffer and the Logging Configuration............................................................................71
Configuring a UNIX Logging Facility Level.......................................................................................................... 71
Synchronizing Log Messages.................................................................................................................................72
Enabling Timestamp on Syslog Messages...........................................................................................................73
File Transfer Services................................................................................................................................................73
Configuration Task List for File Transfer Services........................................................................................73
Enabling the FTP Server.....................................................................................................................................73
Configuring FTP Server Parameters................................................................................................................74
Configuring FTP Client Parameters................................................................................................................ 74
Terminal Lines........................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line.....................................................................................75
Configuring Login Authentication for Terminal Lines................................................................................ 76
Setting Timeout for EXEC Privilege Mode........................................................................................................... 77
Using Telnet to get to Another Network Device................................................................................................77
Lock CONFIGURATION Mode...............................................................................................................................78
9.10(0.1)
4