Deployment Guide

Table Of Contents
Applying a Privilege Level to a Username............................................................................................................. 56
Applying a Privilege Level to a Terminal Line....................................................................................................... 56
Configuring Logging......................................................................................................................................................... 56
Audit and Security Logs.............................................................................................................................................56
Configuring Logging Format .............................................................................................................................58
Setting Up a Secure Connection to a Syslog Server................................................................................ 58
Track Login Activity..........................................................................................................................................................60
Restrictions for Tracking Login Activity................................................................................................................ 60
Configuring Login Activity Tracking........................................................................................................................60
Display Login Statistics.............................................................................................................................................. 60
Limit Concurrent Login Sessions...................................................................................................................................62
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 62
Configuring Concurrent Session Limit....................................................................................................................62
Enabling the System to Clear Existing Sessions.................................................................................................. 62
Enabling Secured CLI Mode............................................................................................................................................63
Log Messages in the Internal Buffer............................................................................................................................ 63
Disabling System Logging............................................................................................................................................... 64
Sending System Messages to a Syslog Server.......................................................................................................... 64
Configuring a UNIX System as a Syslog Server...................................................................................................64
Display the Logging Buffer and the Logging Configuration....................................................................................65
Changing System Logging Settings..............................................................................................................................65
Configuring a UNIX Logging Facility Level..................................................................................................................66
Synchronizing Log Messages......................................................................................................................................... 67
Enabling Timestamp on Syslog Messages................................................................................................................... 67
File Transfer Services.......................................................................................................................................................68
Enabling the FTP Server............................................................................................................................................68
Configuring FTP Server Parameters...................................................................................................................... 68
Configuring FTP Client Parameters........................................................................................................................ 69
Terminal Lines.................................................................................................................................................................... 69
Denying and Permitting Access to a Terminal Line.............................................................................................69
Configuring Login Authentication for Terminal Lines......................................................................................... 70
Setting Time Out of EXEC Privilege Mode................................................................................................................. 70
Using Telnet to Access Another Network Device......................................................................................................71
Lock CONFIGURATION Mode........................................................................................................................................ 71
LPC Bus Quality Degradation......................................................................................................................................... 72
Recovering from a Forgotten Password .................................................................................................................... 73
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration.............................74
Recovering from a Failed Start...................................................................................................................................... 74
Restoring Factory-Default Settings..............................................................................................................................74
Restoring Factory-Default Boot Environment Variables....................................................................................75
Using Hashes to Verify Software Images Before Installation..................................................................... 76
Verifying System Images on C9010 Components......................................................................................................77
When System Images on C9010 Components Do Not Match..........................................................................78
Manually Resetting the System Image on a C9010 Component...................................................................... 78
Logging in to the Virtual Console of a C9010 Component................................................................................ 79
Booting the C9010 from an Image on a Network Server...................................................................................79
Configuring C9010 Components to Boot from the RPM CP Image................................................................79
Viewing the Reason for Last System Reboot............................................................................................................ 80
Chapter 5: 802.1X........................................................................................................................ 81
4
Contents