Setup Guide

Verify Software Images Before Installation...................................................................................................................60
4 Management................................................................................................................................................62
Conguring Privilege Levels............................................................................................................................................62
Creating a Custom Privilege Level...........................................................................................................................62
Removing a Command from EXEC Mode.............................................................................................................. 63
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................63
Allowing Access to CONFIGURATION Mode Commands....................................................................................63
Allowing Access to Dierent Modes........................................................................................................................63
Applying a Privilege Level to a Username...............................................................................................................65
Applying a Privilege Level to a Terminal Line.......................................................................................................... 65
Conguring Logging........................................................................................................................................................ 65
Audit and Security Logs............................................................................................................................................ 66
Conguring Logging Format ...................................................................................................................................67
Setting Up a Secure Connection to a Syslog Server.............................................................................................67
Log Messages in the Internal Buer..............................................................................................................................69
Conguration Task List for System Log Management..........................................................................................69
Disabling System Logging............................................................................................................................................... 69
Sending System Messages to a Syslog Server............................................................................................................69
Conguring a UNIX System as a Syslog Server.....................................................................................................69
Track Login Activity..........................................................................................................................................................70
Restrictions for Tracking Login Activity...................................................................................................................70
Conguring Login Activity Tracking......................................................................................................................... 70
Display Login Statistics...............................................................................................................................................71
Limit Concurrent Login Sessions....................................................................................................................................72
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................72
Conguring Concurrent Session Limit.....................................................................................................................72
Enabling the System to Clear Existing Sessions.................................................................................................... 73
Enabling Secured CLI Mode............................................................................................................................................74
Changing System Logging Settings............................................................................................................................... 74
Display the Logging Buer and the Logging Conguration........................................................................................75
Conguring a UNIX Logging Facility Level.................................................................................................................... 77
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 79
File Transfer Services...................................................................................................................................................... 80
Conguration Task List for File Transfer Services..................................................................................................80
Enabling the FTP Server...........................................................................................................................................80
Conguring FTP Server Parameters........................................................................................................................ 81
Conguring FTP Client Parameters..........................................................................................................................81
Terminal Lines................................................................................................................................................................... 82
Denying and Permitting Access to a Terminal Line................................................................................................82
Conguring Login Authentication for Terminal Lines.............................................................................................83
Setting Timeout for EXEC Privilege Mode................................................................................................................... 84
Using Telnet to get to Another Network Device..........................................................................................................84
Lock CONFIGURATION Mode.......................................................................................................................................85
Viewing the Conguration Lock Status...................................................................................................................85
4
Contents