Install Guide

Table Of Contents
Allowing Access to Different Modes...................................................................................................................... 53
Applying a Privilege Level to a Username..............................................................................................................54
Applying a Privilege Level to a Terminal Line....................................................................................................... 54
Configuring Logging......................................................................................................................................................... 54
Audit and Security Logs.............................................................................................................................................55
Configuring Logging Format .............................................................................................................................56
Setting Up a Secure Connection to a Syslog Server................................................................................ 56
Log Messages in the Internal Buffer............................................................................................................................ 58
Disabling System Logging............................................................................................................................................... 58
Sending System Messages to a Syslog Server..........................................................................................................58
Configuring a UNIX System as a Syslog Server...................................................................................................58
Track Login Activity..........................................................................................................................................................59
Restrictions for Tracking Login Activity................................................................................................................ 59
Configuring Login Activity Tracking........................................................................................................................59
Display Login Statistics.............................................................................................................................................. 59
Limit Concurrent Login Sessions....................................................................................................................................61
Restrictions for Limiting the Number of Concurrent Sessions......................................................................... 61
Configuring Concurrent Session Limit.................................................................................................................... 61
Enabling the System to Clear Existing Sessions...................................................................................................61
Enabling Secured CLI Mode............................................................................................................................................62
Changing System Logging Settings..............................................................................................................................62
Display the Logging Buffer and the Logging Configuration....................................................................................63
Configuring a UNIX Logging Facility Level..................................................................................................................64
Synchronizing Log Messages......................................................................................................................................... 65
Enabling Timestamp on Syslog Messages...................................................................................................................65
File Transfer Services.......................................................................................................................................................66
Enabling the FTP Server............................................................................................................................................67
Configuring FTP Server Parameters.......................................................................................................................67
Configuring FTP Client Parameters........................................................................................................................ 67
Terminal Lines.................................................................................................................................................................... 68
Denying and Permitting Access to a Terminal Line.............................................................................................68
Configuring Login Authentication for Terminal Lines......................................................................................... 69
Setting Timeout for EXEC Privilege Mode..................................................................................................................70
Using Telnet to get to Another Network Device.......................................................................................................70
Lock CONFIGURATION Mode........................................................................................................................................ 71
Restoring the Factory Default Settings........................................................................................................................71
Restoring Factory Default Environment Variables.............................................................................................. 72
Viewing the Reason for Last System Reboot.............................................................................................................72
Disabling Syslog Messages for SNMP Authentication Failure Events..................................................................72
Chapter 5: 802.1X........................................................................................................................73
Port-Authentication Process.......................................................................................................................................... 74
EAP over RADIUS........................................................................................................................................................75
Configuring 802.1X............................................................................................................................................................76
Important Points to Remember..................................................................................................................................... 76
Enabling 802.1X..................................................................................................................................................................76
Configuring Request Identity Re-Transmissions........................................................................................................ 77
Configuring a Quiet Period after a Failed Authentication.................................................................................. 77
Forcibly Authorizing or Unauthorizing a Port............................................................................................................. 77
Re-Authenticating a Port................................................................................................................................................ 78
4
Contents