Removing a Command from EXEC Mode
....................................................................................................
54
Moving a Command from EXEC Privilege Mode to EXEC Mode
.............................................................
54
Allowing Access to CONFIGURATION Mode Commands
.........................................................................
55
Allowing Access to the Following Modes
......................................................................................................
55
Applying a Privilege Level to a Username
.....................................................................................................
56
Applying a Privilege Level to a Terminal Line
................................................................................................
57
Configuring Logging
................................................................................................................................................
57
Audit and Security Logs
.....................................................................................................................................
57
Configuring Logging Format
.........................................................................................................................
59
Setting Up a Secure Connection to a Syslog Server
...................................................................................
59
Track Login Activity
..................................................................................................................................................
61
Restrictions for Tracking Login Activity
..........................................................................................................
61
Configuring Login Activity Tracking
................................................................................................................
61
Display Login Statistics
.......................................................................................................................................
61
Limit Concurrent Login Sessions
..........................................................................................................................
63
Restrictions for Limiting the Number of Concurrent Sessions
.................................................................
63
Configuring Concurrent Session Limit
...........................................................................................................
63
Enabling the System to Clear Existing Sessions
...........................................................................................
63
Log Messages in the Internal Buffer
.....................................................................................................................
64
Configuration Task List for System Log Management
...............................................................................
64
Disabling System Logging
......................................................................................................................................
65
Sending System Messages to a Syslog Server
....................................................................................................
65
Configuring a UNIX System as a Syslog Server
............................................................................................
65
Display the Logging Buffer and the Logging Configuration
...........................................................................
66
Changing System Logging Settings
......................................................................................................................
66
Configuring a UNIX Logging Facility Level
..........................................................................................................
67
Synchronizing Log Messages
................................................................................................................................
68
Enabling Timestamp on Syslog Messages
..........................................................................................................
68
File Transfer Services
...............................................................................................................................................
69
Configuration Task List for File Transfer Services
........................................................................................
69
Enabling the FTP Server
....................................................................................................................................
69
Configuring FTP Server Parameters
................................................................................................................
70
Configuring FTP Client Parameters
................................................................................................................
70
Terminal Lines
............................................................................................................................................................
71
Denying and Permitting Access to a Terminal Line
.....................................................................................
71
Configuring Login Authentication for Terminal Lines
.................................................................................
71
Setting Time Out of EXEC Privilege Mode
...........................................................................................................
72
Using Telnet to Access Another Network Device
..............................................................................................
73
Lock CONFIGURATION Mode
...............................................................................................................................
73
Viewing the Configuration Lock Status
..........................................................................................................
73
Recovering from a Forgotten Password
.............................................................................................................
74
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration
.....................
75
Recovering from a Failed Start
...............................................................................................................................
75
Restoring Factory-Default Settings
.......................................................................................................................
75
Important Point to Remember
.........................................................................................................................
76
Restoring Factory-Default Boot Environment Variables
............................................................................
76
Using Hashes to Verify Software Images Before Installation
...........................................................................
77
Version 9.10(0.1)
4