Users Guide

Using Hashes to Validate Software Images...................................................................................................................... 56
Using HTTP for File Transfers...........................................................................................................................................57
4 Management.................................................................................................................59
Conguring Privilege Levels............................................................................................................................................. 59
Creating a Custom Privilege Level..............................................................................................................................59
Removing a Command from EXEC Mode.................................................................................................................. 59
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................................................59
Allowing Access to CONFIGURATION Mode Commands...........................................................................................59
Allowing Access to the Following Modes....................................................................................................................60
Applying a Privilege Level to a Username.................................................................................................................... 61
Applying a Privilege Level to a Terminal Line............................................................................................................... 62
Conguring Logging......................................................................................................................................................... 62
Audit and Security Logs............................................................................................................................................. 62
Conguring Logging Format .....................................................................................................................................64
Display the Logging Buer and the Logging Conguration......................................................................................... 64
Setting Up a Secure Connection to a Syslog Server...................................................................................................65
Sending System Messages to a Syslog Server........................................................................................................... 66
Track Login Activity.......................................................................................................................................................... 66
Restrictions for Tracking Login Activity...................................................................................................................... 66
Conguring Login Activity Tracking............................................................................................................................ 66
Display Login Statistics............................................................................................................................................... 67
Limit Concurrent Login Sessions...................................................................................................................................... 68
Restrictions for Limiting the Number of Concurrent Sessions.................................................................................... 68
Conguring Concurrent Session Limit........................................................................................................................ 68
Enabling the System to Clear Existing Sessions......................................................................................................... 68
Log Messages in the Internal Buer................................................................................................................................. 69
Conguration Task List for System Log Management................................................................................................ 69
Disabling System Logging.................................................................................................................................................69
Sending System Messages to a Syslog Server................................................................................................................. 70
Conguring a UNIX System as a Syslog Server.......................................................................................................... 70
Changing System Logging Settings..................................................................................................................................70
Display the Logging Buer and the Logging Conguration................................................................................................ 71
Conguring a UNIX Logging Facility Level........................................................................................................................ 72
Synchronizing Log Messages............................................................................................................................................73
Enabling Timestamp on Syslog Messages.........................................................................................................................73
File Transfer Services........................................................................................................................................................74
Conguration Task List for File Transfer Services........................................................................................................74
Enabling the FTP Server.............................................................................................................................................74
Conguring FTP Server Parameters........................................................................................................................... 74
Conguring FTP Client Parameters............................................................................................................................ 75
Terminal Lines...................................................................................................................................................................75
Denying and Permitting Access to a Terminal Line......................................................................................................75
Conguring Login Authentication for Terminal Lines................................................................................................... 77
Setting Time Out of EXEC Privilege Mode....................................................................................................................... 77
Using Telnet to get to Another Network Device............................................................................................................... 78
4