Concept Guide

4 Management................................................................................................................................................63
Conguring Privilege Levels............................................................................................................................................63
Creating a Custom Privilege Level...........................................................................................................................64
Removing a Command from EXEC Mode.............................................................................................................. 64
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................64
Allowing Access to CONFIGURATION Mode Commands....................................................................................64
Allowing Access to Dierent Modes........................................................................................................................64
Applying a Privilege Level to a Username............................................................................................................... 66
Applying a Privilege Level to a Terminal Line.......................................................................................................... 66
Conguring Logging........................................................................................................................................................ 66
Audit and Security Logs............................................................................................................................................ 67
Conguring Logging Format ...................................................................................................................................69
Setting Up a Secure Connection to a Syslog Server.............................................................................................69
Log Messages in the Internal Buer..............................................................................................................................70
Conguration Task List for System Log Management.......................................................................................... 70
Disabling System Logging............................................................................................................................................... 70
Sending System Messages to a Syslog Server.............................................................................................................71
Conguring a UNIX System as a Syslog Server......................................................................................................71
Track Login Activity.......................................................................................................................................................... 71
Restrictions for Tracking Login Activity................................................................................................................... 71
Conguring Login Activity Tracking..........................................................................................................................71
Display Login Statistics..............................................................................................................................................72
Limit Concurrent Login Sessions....................................................................................................................................73
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................73
Conguring Concurrent Session Limit.....................................................................................................................74
Enabling the System to Clear Existing Sessions.....................................................................................................74
Enabling Secured CLI Mode........................................................................................................................................... 75
Changing System Logging Settings...............................................................................................................................75
Display the Logging Buer and the Logging Conguration........................................................................................ 76
Conguring a UNIX Logging Facility Level....................................................................................................................76
Synchronizing Log Messages......................................................................................................................................... 78
Enabling Timestamp on Syslog Messages.................................................................................................................... 78
File Transfer Services....................................................................................................................................................... 81
Conguration Task List for File Transfer Services...................................................................................................81
Enabling the FTP Server............................................................................................................................................81
Conguring FTP Server Parameters....................................................................................................................... 82
Conguring FTP Client Parameters.........................................................................................................................82
Terminal Lines...................................................................................................................................................................83
Denying and Permitting Access to a Terminal Line................................................................................................83
Conguring Login Authentication for Terminal Lines.............................................................................................84
Setting Timeout for EXEC Privilege Mode...................................................................................................................85
Using Telnet to get to Another Network Device..........................................................................................................85
Lock CONFIGURATION Mode....................................................................................................................................... 86
Viewing the Conguration Lock Status...................................................................................................................86
Recovering from a Forgotten Password on the S6000.............................................................................................. 87
4
Contents