White Papers

4 Management............................................................................................................................................... 60
Conguring Privilege Levels........................................................................................................................................... 60
Creating a Custom Privilege Level............................................................................................................................61
Removing a Command from EXEC Mode............................................................................................................... 61
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................ 61
Allowing Access to CONFIGURATION Mode Commands.....................................................................................61
Allowing Access to Dierent Modes........................................................................................................................ 61
Applying a Privilege Level to a Username............................................................................................................... 63
Applying a Privilege Level to a Terminal Line.......................................................................................................... 63
Conguring Logging........................................................................................................................................................ 63
Audit and Security Logs............................................................................................................................................ 64
Conguring Logging Format ...................................................................................................................................66
Setting Up a Secure Connection to a Syslog Server.............................................................................................66
Log Messages in the Internal Buer..............................................................................................................................67
Conguration Task List for System Log Management.......................................................................................... 67
Disabling System Logging............................................................................................................................................... 67
Sending System Messages to a Syslog Server............................................................................................................68
Conguring a UNIX System as a Syslog Server.....................................................................................................68
Track Login Activity......................................................................................................................................................... 68
Restrictions for Tracking Login Activity...................................................................................................................68
Conguring Login Activity Tracking......................................................................................................................... 68
Display Login Statistics..............................................................................................................................................69
Limit Concurrent Login Sessions....................................................................................................................................70
Restrictions for Limiting the Number of Concurrent Sessions.............................................................................70
Conguring Concurrent Session Limit......................................................................................................................71
Enabling the System to Clear Existing Sessions..................................................................................................... 71
Enabling Secured CLI Mode............................................................................................................................................72
Changing System Logging Settings...............................................................................................................................72
Display the Logging Buer and the Logging Conguration........................................................................................ 73
Conguring a UNIX Logging Facility Level.................................................................................................................... 73
Synchronizing Log Messages......................................................................................................................................... 75
Enabling Timestamp on Syslog Messages....................................................................................................................75
File Transfer Services.......................................................................................................................................................76
Conguration Task List for File Transfer Services..................................................................................................76
Enabling the FTP Server........................................................................................................................................... 76
Conguring FTP Server Parameters........................................................................................................................76
Conguring FTP Client Parameters......................................................................................................................... 77
Terminal Lines................................................................................................................................................................... 77
Denying and Permitting Access to a Terminal Line................................................................................................ 78
Conguring Login Authentication for Terminal Lines.............................................................................................79
Setting Timeout for EXEC Privilege Mode...................................................................................................................80
Using Telnet to get to Another Network Device..........................................................................................................80
Lock CONFIGURATION Mode........................................................................................................................................81
Viewing the Conguration Lock Status................................................................................................................... 81
Recovering from a Forgotten Password on the S6000...............................................................................................81
4
Contents