Install Guide

Table Of Contents
Removing a Command from EXEC Mode..............................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 57
Allowing Access to CONFIGURATION Mode Commands..................................................................................57
Allowing Access to Different Modes.......................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................. 58
Applying a Privilege Level to a Terminal Line....................................................................................................... 58
Configuring Logging......................................................................................................................................................... 59
Audit and Security Logs.............................................................................................................................................59
Configuring Logging Format ..............................................................................................................................61
Setting Up a Secure Connection to a Syslog Server................................................................................. 61
Log Messages in the Internal Buffer............................................................................................................................ 62
Disabling System Logging............................................................................................................................................... 62
Sending System Messages to a Syslog Server.......................................................................................................... 63
Configuring a UNIX System as a Syslog Server...................................................................................................63
Track Login Activity..........................................................................................................................................................63
Restrictions for Tracking Login Activity................................................................................................................ 63
Configuring Login Activity Tracking........................................................................................................................63
Display Login Statistics.............................................................................................................................................. 64
Limit Concurrent Login Sessions...................................................................................................................................65
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 65
Configuring Concurrent Session Limit................................................................................................................... 66
Enabling the System to Clear Existing Sessions..................................................................................................66
Enabling Secured CLI Mode............................................................................................................................................67
Changing System Logging Settings..............................................................................................................................67
Display the Logging Buffer and the Logging Configuration....................................................................................68
Configuring a UNIX Logging Facility Level..................................................................................................................70
Synchronizing Log Messages.......................................................................................................................................... 71
Enabling Timestamp on Syslog Messages................................................................................................................... 72
File Transfer Services.......................................................................................................................................................73
Enabling the FTP Server............................................................................................................................................ 73
Configuring FTP Server Parameters.......................................................................................................................74
Configuring FTP Client Parameters........................................................................................................................ 74
Terminal Lines.....................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................. 75
Configuring Login Authentication for Terminal Lines......................................................................................... 76
Setting Timeout for EXEC Privilege Mode..................................................................................................................76
Using Telnet to get to Another Network Device....................................................................................................... 77
Lock CONFIGURATION Mode........................................................................................................................................77
Reloading the system....................................................................................................................................................... 78
Restoring the Factory Default Settings....................................................................................................................... 79
Restoring Factory Default Environment Variables.............................................................................................. 79
Chapter 5: 802.1X........................................................................................................................ 81
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS........................................................................................................................................................83
Configuring 802.1X............................................................................................................................................................84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................. 85
Configuring dot1x Profile ................................................................................................................................................86
Configuring the Static MAB and MAB Profile ...........................................................................................................87
4
Contents