Service Manual

Verify Software Images Before Installation.........................................................................................................56
Using HTTP for File Transfers.................................................................................................................................57
4 Management.......................................................................................................................................................... 59
Configuring Privilege Levels...................................................................................................................................59
Creating a Custom Privilege Level..................................................................................................................59
Removing a Command from EXEC Mode.................................................................................................... 60
Moving a Command from EXEC Privilege Mode to EXEC Mode.............................................................60
Allowing Access to CONFIGURATION Mode Commands........................................................................ 60
Allowing Access to Different Modes.............................................................................................................. 60
Applying a Privilege Level to a Username..................................................................................................... 62
Applying a Privilege Level to a Terminal Line............................................................................................... 62
Configuring Logging................................................................................................................................................62
Audit and Security Logs.....................................................................................................................................63
Configuring Logging Format ......................................................................................................................... 64
Display the Logging Buffer and the Logging Configuration..................................................................... 65
Setting Up a Secure Connection to a Syslog Server...................................................................................66
Sending System Messages to a Syslog Server.............................................................................................. 67
Track Login Activity..................................................................................................................................................67
Restrictions for Tracking Login Activity..........................................................................................................67
Configuring Login Activity Tracking............................................................................................................... 67
Display Login Statistics...................................................................................................................................... 68
Limit Concurrent Login Sessions.......................................................................................................................... 69
Restrictions for Limiting the Number of Concurrent Sessions.................................................................69
Configuring Concurrent Session Limit...........................................................................................................70
Enabling the System to Clear Existing Sessions...........................................................................................70
Log Messages in the Internal Buffer......................................................................................................................71
Configuration Task List for System Log Management................................................................................ 71
Disabling System Logging....................................................................................................................................... 71
Sending System Messages to a Syslog Server.....................................................................................................71
Configuring a UNIX System as a Syslog Server.............................................................................................71
Changing System Logging Settings......................................................................................................................72
Display the Logging Buffer and the Logging Configuration............................................................................73
Configuring a UNIX Logging Facility Level..........................................................................................................73
Synchronizing Log Messages.................................................................................................................................74
Enabling Timestamp on Syslog Messages...........................................................................................................75
File Transfer Services................................................................................................................................................75
Configuration Task List for File Transfer Services........................................................................................ 75
Enabling the FTP Server.....................................................................................................................................76
Configuring FTP Server Parameters................................................................................................................76
Configuring FTP Client Parameters................................................................................................................ 76
Terminal Lines............................................................................................................................................................77
Denying and Permitting Access to a Terminal Line.....................................................................................77
Configuring Login Authentication for Terminal Lines................................................................................ 78
Setting Timeout for EXEC Privilege Mode...........................................................................................................79
Using Telnet to get to Another Network Device...............................................................................................80
Lock CONFIGURATION Mode.............................................................................................................................. 80
9.10(0.1)
4