User Manual

Security Examples
11-27
For example, to record all logins and send the information to the console port, use the following command:
Figure 11-51: Logging All Logins
Note: Logging passwords may compromise security.
Each logging level logs all events associated with higher logging levels. For example, if logging level 6 is
specified, the events associated with levels 1-5 will also be logged.
To disable all logging, use the following command:
Figure 11-52: Disabling Event Logging
11.8 Examples
11.8.1 Database Search Order
The SCS must be configured for authentication using a UNIX password file. The configuration must meet
the following criteria:
A large group of users is listed in a RADIUS authentication database. The RADIUS servers IP
address is 192.0.1.55, and port 1640 is used rather than the default RADIUS authentication port.
Two other groups of users are listed in UNIX password files; the files are on hosts 192.0.1.87 and
192.0.1.99.
Any additional users will be added to the local database.
A RADIUS accounting server has been set up at host 192.0.1.176 to log accounting information.
7 Chat Scripts
8 Modems and Dialback
System Enabled
Disabled
Local>> DEFINE LOGGING AUTHENTICATION 3
Local>> DEFINE LOGGING DESTINATION NONE
Table 11-2: Events Logged by the SCS, cont.
To Log Events
Associated With:
The Following Options are Available:
(Numbers Reflect Logging Level)