Users Guide

Removing a Command from EXEC Mode..................................................................................................................52
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 52
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 52
Allowing Access to Different Modes...........................................................................................................................52
Applying a Privilege Level to a Username...................................................................................................................54
Applying a Privilege Level to a Terminal Line............................................................................................................. 54
Configuring Logging............................................................................................................................................................54
Audit and Security Logs................................................................................................................................................54
Configuring Logging Format ................................................................................................................................ 56
Display the Logging Buffer and the Logging Configuration.....................................................................................56
Setting Up a Secure Connection to a Syslog Server.......................................................................................57
Sending System Messages to a Syslog Server......................................................................................................... 58
Track Login Activity............................................................................................................................................................ 58
Restrictions for Tracking Login Activity..................................................................................................................... 58
Configuring Login Activity Tracking............................................................................................................................ 58
Display Login Statistics................................................................................................................................................. 59
Limit Concurrent Login Sessions.......................................................................................................................................59
Restrictions for Limiting the Number of Concurrent Sessions................................................................................60
Configuring Concurrent Session Limit........................................................................................................................ 60
Enabling the System to Clear Existing Sessions........................................................................................................60
Log Messages in the Internal Buffer..................................................................................................................................61
Disabling System Logging................................................................................................................................................... 61
Sending System Messages to a Syslog Server................................................................................................................ 61
Configuring a UNIX System as a Syslog Server.........................................................................................................61
Changing System Logging Settings..................................................................................................................................62
Display the Logging Buffer and the Logging Configuration...........................................................................................62
Configuring a UNIX Logging Facility Level.......................................................................................................................63
Synchronizing Log Messages............................................................................................................................................ 64
Enabling Timestamp on Syslog Messages........................................................................................................................64
File Transfer Services......................................................................................................................................................... 65
Enabling the FTP Server...............................................................................................................................................65
Configuring FTP Server Parameters...........................................................................................................................65
Configuring FTP Client Parameters............................................................................................................................ 66
Terminal Lines...................................................................................................................................................................... 66
Denying and Permitting Access to a Terminal Line...................................................................................................66
Configuring Login Authentication for Terminal Lines................................................................................................67
Setting Timeout for EXEC Privilege Mode.......................................................................................................................68
Using Telnet to get to Another Network Device............................................................................................................ 68
Lock CONFIGURATION Mode.......................................................................................................................................... 69
Chapter 5: 802.1ag........................................................................................................................ 70
Ethernet CFM...................................................................................................................................................................... 70
Maintenance Domains..........................................................................................................................................................71
Maintenance Points............................................................................................................................................................. 71
Maintenance End Points.....................................................................................................................................................72
Implementation Information............................................................................................................................................... 72
Configuring the CFM...........................................................................................................................................................72
Enable Ethernet CFM..........................................................................................................................................................73
Creating a Maintenance Domain........................................................................................................................................73
Creating a Maintenance Association.................................................................................................................................73
4
Contents