Users Guide

Configuring Privilege Levels........................................................................................................................................... 57
Creating a Custom Privilege Level.......................................................................................................................... 58
Removing a Command from EXEC Mode..............................................................................................................58
Moving a Command from EXEC Privilege Mode to EXEC Mode....................................................................... 58
Allowing Access to CONFIGURATION Mode Commands................................................................................... 58
Allowing Access to Different Modes.......................................................................................................................58
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line......................................................................................................... 60
Configuring Logging........................................................................................................................................................ 60
Audit and Security Logs.............................................................................................................................................61
Configuring Logging Format .................................................................................................................................. 63
Setting Up a Secure Connection to a Syslog Server............................................................................................ 63
Log Messages in the Internal Buffer............................................................................................................................. 64
Configuration Task List for System Log Management.........................................................................................64
Disabling System Logging...............................................................................................................................................64
Sending System Messages to a Syslog Server............................................................................................................65
Configuring a UNIX System as a Syslog Server.................................................................................................... 65
Track Login Activity.........................................................................................................................................................65
Restrictions for Tracking Login Activity..................................................................................................................65
Configuring Login Activity Tracking........................................................................................................................ 65
Display Login Statistics............................................................................................................................................. 66
Limit Concurrent Login Sessions................................................................................................................................... 67
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 67
Configuring Concurrent Session Limit.................................................................................................................... 68
Enabling the System to Clear Existing Sessions....................................................................................................68
Enabling Secured CLI Mode...........................................................................................................................................69
Changing System Logging Settings.............................................................................................................................. 69
Display the Logging Buffer and the Logging Configuration....................................................................................... 70
Configuring a UNIX Logging Facility Level................................................................................................................... 70
Synchronizing Log Messages.........................................................................................................................................72
Enabling Timestamp on Syslog Messages.................................................................................................................... 72
File Transfer Services......................................................................................................................................................73
Configuration Task List for File Transfer Services.................................................................................................73
Enabling the FTP Server........................................................................................................................................... 73
Configuring FTP Server Parameters....................................................................................................................... 73
Configuring FTP Client Parameters.........................................................................................................................74
Terminal Lines...................................................................................................................................................................74
Denying and Permitting Access to a Terminal Line............................................................................................... 75
Configuring Login Authentication for Terminal Lines............................................................................................ 76
Setting Timeout for EXEC Privilege Mode................................................................................................................... 77
Using Telnet to get to Another Network Device......................................................................................................... 77
Lock CONFIGURATION Mode.......................................................................................................................................78
Viewing the Configuration Lock Status.................................................................................................................. 78
Recovering from a Forgotten Password on the S6000............................................................................................. 78
Recovering from a Forgotten Enable Password..........................................................................................................79
4
Contents