Administrator Guide

Table Of Contents
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 48
Allowing Access to CONFIGURATION Mode Commands................................................................................. 48
Allowing Access to the Following Modes.............................................................................................................. 48
Applying a Privilege Level to a Username............................................................................................................. 50
Applying a Privilege Level to a Terminal Line....................................................................................................... 50
Configuring Logging......................................................................................................................................................... 50
Audit and Security Logs.............................................................................................................................................50
Configuring Logging Format .............................................................................................................................52
Setting Up a Secure Connection to a Syslog Server................................................................................ 53
Log Messages in the Internal Buffer............................................................................................................................ 54
Disabling System Logging............................................................................................................................................... 54
Sending System Messages to a Syslog Server.......................................................................................................... 54
Configuring a UNIX System as a Syslog Server...................................................................................................54
Changing System Logging Settings..............................................................................................................................55
Display the Logging Buffer and the Logging Configuration....................................................................................55
Configuring a UNIX Logging Facility Level..................................................................................................................56
Synchronizing Log Messages......................................................................................................................................... 57
Enabling Timestamp on Syslog Messages...................................................................................................................57
File Transfer Services.......................................................................................................................................................58
Enabling the FTP Server............................................................................................................................................58
Configuring FTP Server Parameters...................................................................................................................... 58
Configuring FTP Client Parameters........................................................................................................................59
Terminal Lines.................................................................................................................................................................... 59
Denying and Permitting Access to a Terminal Line.............................................................................................59
Configuring Login Authentication for Terminal Lines......................................................................................... 60
Setting Time Out of EXEC Privilege Mode..................................................................................................................61
Using Telnet to get to Another Network Device........................................................................................................61
Lock CONFIGURATION Mode....................................................................................................................................... 62
Recovering from a Forgotten Password on the Z9000 System............................................................................62
Recovering from a Forgotten Enable Password on the Z9000....................................................................... 63
Recovering from a Failed Start on the Z9000 System............................................................................................ 64
Restoring the Factory Default Settings.......................................................................................................................64
Restoring Factory Default Environment Variables.............................................................................................. 65
Chapter 5: 802.1X........................................................................................................................67
The Port-Authentication Process................................................................................................................................. 68
EAP over RADIUS........................................................................................................................................................69
Configuring 802.1X............................................................................................................................................................70
Important Points to Remember..................................................................................................................................... 70
Enabling 802.1X...................................................................................................................................................................71
Configuring Request Identity Re-Transmissions........................................................................................................72
Configuring a Quiet Period after a Failed Authentication..................................................................................73
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 73
Re-Authenticating a Port................................................................................................................................................ 74
Configuring Timeouts....................................................................................................................................................... 75
Configuring Dynamic VLAN Assignment with Port Authentication.......................................................................76
Guest and Authentication-Fail VLANs..........................................................................................................................77
Configuring a Guest VLAN........................................................................................................................................ 77
Configuring an Authentication-Fail VLAN..............................................................................................................77
4
Contents