Setup Guide

Table Of Contents
Removing a Command from EXEC Mode............................................................................................................. 55
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 55
Allowing Access to CONFIGURATION Mode Commands................................................................................. 55
Allowing Access to Different Modes...................................................................................................................... 55
Applying a Privilege Level to a Username..............................................................................................................57
Applying a Privilege Level to a Terminal Line........................................................................................................57
Configuring Logging..........................................................................................................................................................57
Audit and Security Logs............................................................................................................................................. 57
Configuring Logging Format .............................................................................................................................59
Display the Logging Buffer and the Logging Configuration..............................................................................59
Setting Up a Secure Connection to a Syslog Server................................................................................ 60
Sending System Messages to a Syslog Server.....................................................................................................61
Track Login Activity...........................................................................................................................................................61
Restrictions for Tracking Login Activity................................................................................................................. 61
Configuring Login Activity Tracking........................................................................................................................ 61
Display Login Statistics.............................................................................................................................................. 62
Limit Concurrent Login Sessions...................................................................................................................................63
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 63
Configuring Concurrent Session Limit....................................................................................................................64
Enabling the System to Clear Existing Sessions.................................................................................................. 64
Enabling Secured CLI Mode........................................................................................................................................... 65
Log Messages in the Internal Buffer............................................................................................................................ 65
Disabling System Logging............................................................................................................................................... 65
Sending System Messages to a Syslog Server..........................................................................................................65
Configuring a UNIX System as a Syslog Server...................................................................................................66
Changing System Logging Settings..............................................................................................................................66
Display the Logging Buffer and the Logging Configuration....................................................................................67
Configuring a UNIX Logging Facility Level..................................................................................................................67
Synchronizing Log Messages......................................................................................................................................... 68
Enabling Timestamp on Syslog Messages...................................................................................................................69
File Transfer Services.......................................................................................................................................................69
Enabling the FTP Server............................................................................................................................................69
Configuring FTP Server Parameters.......................................................................................................................70
Configuring FTP Client Parameters........................................................................................................................ 70
Terminal Lines.................................................................................................................................................................... 70
Denying and Permitting Access to a Terminal Line..............................................................................................71
Configuring Login Authentication for Terminal Lines..........................................................................................72
Setting Timeout for EXEC Privilege Mode..................................................................................................................72
Using Telnet to get to Another Network Device....................................................................................................... 73
Lock CONFIGURATION Mode........................................................................................................................................73
LPC Bus Quality Degradation......................................................................................................................................... 74
Reloading the system....................................................................................................................................................... 75
Viewing the Reason for Last System Reboot.............................................................................................................75
Chapter 5: 802.1X........................................................................................................................77
Port-Authentication Process..........................................................................................................................................78
EAP over RADIUS........................................................................................................................................................79
Configuring 802.1X............................................................................................................................................................80
Important Points to Remember..................................................................................................................................... 80
Configuring dot1x Profile ................................................................................................................................................80
4
Contents