Users Guide
Removing a Command from EXEC Mode..............................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 57
Allowing Access to CONFIGURATION Mode Commands..................................................................................57
Allowing Access to Different Modes.......................................................................................................................57
Applying a Privilege Level to a Username..............................................................................................................58
Applying a Privilege Level to a Terminal Line....................................................................................................... 58
Configuring Logging......................................................................................................................................................... 59
Audit and Security Logs.............................................................................................................................................59
Configuring Logging Format ..............................................................................................................................61
Setting Up a Secure Connection to a Syslog Server................................................................................. 61
Log Messages in the Internal Buffer............................................................................................................................ 63
Disabling System Logging................................................................................................................................................63
Sending System Messages to a Syslog Server.......................................................................................................... 63
Configuring a UNIX System as a Syslog Server...................................................................................................63
Track Login Activity..........................................................................................................................................................64
Restrictions for Tracking Login Activity................................................................................................................ 64
Configuring Login Activity Tracking........................................................................................................................64
Display Login Statistics.............................................................................................................................................. 64
Limit Concurrent Login Sessions...................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 66
Configuring Concurrent Session Limit....................................................................................................................66
Enabling the System to Clear Existing Sessions..................................................................................................66
Enabling Secured CLI Mode............................................................................................................................................67
Changing System Logging Settings..............................................................................................................................68
Display the Logging Buffer and the Logging Configuration....................................................................................68
Configuring a UNIX Logging Facility Level...................................................................................................................71
Synchronizing Log Messages......................................................................................................................................... 72
Enabling Timestamp on Syslog Messages................................................................................................................... 72
File Transfer Services.......................................................................................................................................................74
Enabling the FTP Server............................................................................................................................................ 74
Configuring FTP Server Parameters.......................................................................................................................74
Configuring FTP Client Parameters........................................................................................................................ 75
Terminal Lines.................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line............................................................................................. 75
Configuring Login Authentication for Terminal Lines......................................................................................... 76
Setting Timeout for EXEC Privilege Mode.................................................................................................................. 77
Using Telnet to get to Another Network Device....................................................................................................... 78
Lock CONFIGURATION Mode........................................................................................................................................78
Reloading the system....................................................................................................................................................... 79
Restoring the Factory Default Settings.......................................................................................................................80
Restoring Factory Default Environment Variables.............................................................................................. 80
Chapter 5: 802.1X........................................................................................................................82
Port-Authentication Process..........................................................................................................................................83
EAP over RADIUS........................................................................................................................................................84
Configuring 802.1X............................................................................................................................................................85
Important Points to Remember..................................................................................................................................... 85
Enabling 802.1X..................................................................................................................................................................86
Configuring dot1x Profile ................................................................................................................................................ 87
Configuring the Static MAB and MAB Profile ...........................................................................................................88
4
Contents