User Manual
Security Examples
11-27
For example, to record all logins and send the information to the console port, use the following command:
Figure 11-51: Logging All Logins
Note: Logging passwords may compromise security.
Each logging level logs all events associated with higher logging levels. For example, if logging level 6 is
specified, the events associated with levels 1-5 will also be logged.
To disable all logging, use the following command:
Figure 11-52: Disabling Event Logging
11.8 Examples
11.8.1 Database Search Order
The SCS must be configured for authentication using a UNIX password file. The configuration must meet
the following criteria:
◆ A large group of users is listed in a RADIUS authentication database. The RADIUS server’s IP
address is 192.0.1.55, and port 1640 is used rather than the default RADIUS authentication port.
◆ Two other groups of users are listed in UNIX password files; the files are on hosts 192.0.1.87 and
192.0.1.99.
◆ Any additional users will be added to the local database.
◆ A RADIUS accounting server has been set up at host 192.0.1.176 to log accounting information.
7 Chat Scripts
8 Modems and Dialback
System Enabled
Disabled
Local>> DEFINE LOGGING AUTHENTICATION 3
Local>> DEFINE LOGGING DESTINATION NONE
Table 11-2: Events Logged by the SCS, cont.
To Log Events
Associated With:
The Following Options are Available:
(Numbers Reflect Logging Level)