Service Manual
Using Hashes to Validate Software Images...................................................................................................................... 53
Using HTTP for File Transfers.......................................................................................................................................... 54
4 Management.................................................................................................................56
Conguring Privilege Levels............................................................................................................................................. 56
Creating a Custom Privilege Level..............................................................................................................................56
Removing a Command from EXEC Mode.................................................................................................................. 56
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................56
Allowing Access to CONFIGURATION Mode Commands...........................................................................................56
Allowing Access to the Following Modes.................................................................................................................... 57
Applying a Privilege Level to a Username................................................................................................................... 58
Applying a Privilege Level to a Terminal Line...............................................................................................................59
Conguring Logging......................................................................................................................................................... 59
Audit and Security Logs............................................................................................................................................. 59
Conguring Logging Format ......................................................................................................................................61
Display the Logging Buer and the Logging Conguration..........................................................................................61
Setting Up a Secure Connection to a Syslog Server...................................................................................................62
Sending System Messages to a Syslog Server........................................................................................................... 63
Track Login Activity.......................................................................................................................................................... 63
Restrictions for Tracking Login Activity...................................................................................................................... 63
Conguring Login Activity Tracking............................................................................................................................ 63
Display Login Statistics...............................................................................................................................................64
Limit Concurrent Login Sessions...................................................................................................................................... 65
Restrictions for Limiting the Number of Concurrent Sessions....................................................................................65
Conguring Concurrent Session Limit........................................................................................................................ 65
Enabling the System to Clear Existing Sessions......................................................................................................... 65
Log Messages in the Internal Buer................................................................................................................................. 66
Conguration Task List for System Log Management................................................................................................ 66
Disabling System Logging.................................................................................................................................................66
Sending System Messages to a Syslog Server................................................................................................................. 67
Conguring a UNIX System as a Syslog Server.......................................................................................................... 67
Changing System Logging Settings.................................................................................................................................. 67
Display the Logging Buer and the Logging Conguration............................................................................................... 68
Conguring a UNIX Logging Facility Level........................................................................................................................ 69
Synchronizing Log Messages........................................................................................................................................... 70
Enabling Timestamp on Syslog Messages.........................................................................................................................70
File Transfer Services........................................................................................................................................................ 71
Conguration Task List for File Transfer Services........................................................................................................ 71
Enabling the FTP Server............................................................................................................................................. 71
Conguring FTP Server Parameters............................................................................................................................71
Conguring FTP Client Parameters............................................................................................................................ 72
Terminal Lines...................................................................................................................................................................72
Denying and Permitting Access to a Terminal Line......................................................................................................72
Conguring Login Authentication for Terminal Lines................................................................................................... 74
Setting Time Out of EXEC Privilege Mode....................................................................................................................... 74
Using Telnet to get to Another Network Device............................................................................................................... 75
4