Setup Guide
Conguring Privilege Levels........................................................................................................................................... 58
Creating a Custom Privilege Level...........................................................................................................................59
Removing a Command from EXEC Mode.............................................................................................................. 59
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................59
Allowing Access to CONFIGURATION Mode Commands....................................................................................59
Allowing Access to Dierent Modes........................................................................................................................59
Applying a Privilege Level to a Username...............................................................................................................60
Applying a Privilege Level to a Terminal Line.......................................................................................................... 60
Conguring Logging......................................................................................................................................................... 61
Audit and Security Logs.............................................................................................................................................61
Conguring Logging Format ...................................................................................................................................63
Setting Up a Secure Connection to a Syslog Server.............................................................................................63
Log Messages in the Internal Buer..............................................................................................................................65
Conguration Task List for System Log Management..........................................................................................65
Disabling System Logging...............................................................................................................................................65
Sending System Messages to a Syslog Server............................................................................................................65
Conguring a UNIX System as a Syslog Server.....................................................................................................65
Track Login Activity......................................................................................................................................................... 66
Restrictions for Tracking Login Activity.................................................................................................................. 66
Conguring Login Activity Tracking.........................................................................................................................66
Display Login Statistics..............................................................................................................................................67
Limit Concurrent Login Sessions....................................................................................................................................68
Restrictions for Limiting the Number of Concurrent Sessions............................................................................ 68
Conguring Concurrent Session Limit.....................................................................................................................68
Enabling the System to Clear Existing Sessions.................................................................................................... 69
Enabling Secured CLI Mode........................................................................................................................................... 70
Changing System Logging Settings...............................................................................................................................70
Display the Logging Buer and the Logging Conguration.........................................................................................71
Conguring a UNIX Logging Facility Level.................................................................................................................... 72
Synchronizing Log Messages......................................................................................................................................... 73
Enabling Timestamp on Syslog Messages.................................................................................................................... 73
File Transfer Services.......................................................................................................................................................74
Conguration Task List for File Transfer Services..................................................................................................75
Enabling the FTP Server...........................................................................................................................................75
Conguring FTP Server Parameters....................................................................................................................... 75
Conguring FTP Client Parameters......................................................................................................................... 76
Terminal Lines................................................................................................................................................................... 76
Denying and Permitting Access to a Terminal Line................................................................................................76
Conguring Login Authentication for Terminal Lines............................................................................................. 77
Setting Timeout for EXEC Privilege Mode................................................................................................................... 78
Using Telnet to get to Another Network Device..........................................................................................................79
Lock CONFIGURATION Mode....................................................................................................................................... 79
Viewing the Conguration Lock Status...................................................................................................................80
Restoring the Factory Default Settings........................................................................................................................ 80
Important Points to Remember................................................................................................................................80
4
Contents










