Connectivity Guide

Table Of Contents
Removing a Command from EXEC Mode..............................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 57
Allowing Access to CONFIGURATION Mode Commands..................................................................................57
Allowing Access to Different Modes.......................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................. 59
Applying a Privilege Level to a Terminal Line....................................................................................................... 59
Configuring Logging......................................................................................................................................................... 59
Audit and Security Logs.............................................................................................................................................59
Configuring Logging Format ..............................................................................................................................61
Display the Logging Buffer and the Logging Configuration...............................................................................61
Setting Up a Secure Connection to a Syslog Server................................................................................ 62
Sending System Messages to a Syslog Server.................................................................................................... 63
Track Login Activity..........................................................................................................................................................63
Restrictions for Tracking Login Activity................................................................................................................ 63
Configuring Login Activity Tracking........................................................................................................................64
Display Login Statistics.............................................................................................................................................. 64
Limit Concurrent Login Sessions...................................................................................................................................65
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 66
Configuring Concurrent Session Limit................................................................................................................... 66
Enabling the System to Clear Existing Sessions..................................................................................................66
Enabling Secured CLI Mode............................................................................................................................................67
Log Messages in the Internal Buffer.............................................................................................................................67
Disabling System Logging................................................................................................................................................67
Sending System Messages to a Syslog Server.......................................................................................................... 68
Configuring a UNIX System as a Syslog Server...................................................................................................68
Changing System Logging Settings..............................................................................................................................68
Display the Logging Buffer and the Logging Configuration....................................................................................69
Configuring a UNIX Logging Facility Level..................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages....................................................................................................................71
File Transfer Services........................................................................................................................................................71
Enabling the FTP Server.............................................................................................................................................71
Configuring FTP Server Parameters.......................................................................................................................72
Configuring FTP Client Parameters........................................................................................................................ 72
Terminal Lines.....................................................................................................................................................................73
Denying and Permitting Access to a Terminal Line............................................................................................. 73
Configuring Login Authentication for Terminal Lines..........................................................................................74
Setting Timeout for EXEC Privilege Mode..................................................................................................................75
Using Telnet to get to Another Network Device.......................................................................................................75
Lock CONFIGURATION Mode....................................................................................................................................... 76
LPC Bus Quality Degradation......................................................................................................................................... 76
Restoring the Factory Default Settings....................................................................................................................... 77
Restoring Factory Default Environment Variables.............................................................................................. 78
Viewing the Reason for Last System Reboot.............................................................................................................79
Chapter 5: 802.1X....................................................................................................................... 80
Port-Authentication Process...........................................................................................................................................81
EAP over RADIUS........................................................................................................................................................82
Configuring 802.1X............................................................................................................................................................83
Important Points to Remember..................................................................................................................................... 83
4
Contents