Cisco CSACS-1121-K9 Reference Guide - Page 23

CLI Audit

Page 23 highlights

Chapter 1 Overview of the ACS Command Line Interface CLI Audit Table 1-5 Summary of Configuration Commands (continued) Command kron occurrence kron policy-list logging logging loglevel no ntp password-policy repository service snmp-server community snmp-server contact snmp-server host snmp-server location username Description Schedule one or more Command Scheduler commands to run at a specific date and time or a recurring level. Specifies a name for a Command Scheduler policy. Enables the system to forward logs to a remote system. Configures the log level for the logging command. Disables or removes the function associated with the command. Synchronizes the software clock through the NTP server for the system. Enables and configures the password policy. Enters the repository submode. Specifies the type of service to manage. Sets up the community access string to permit access to the Simple Network Management Protocol (SNMP). Configures the SNMP contact MIB value on the system. Sends SNMP traps to a remote system. Configures the SNMP location MIB value on the system. Adds a user to the system with a password and a privilege level. For detailed information on Configuration mode and submode commands, see Understanding Command Modes, page 2-6. CLI Audit You must have administrator access to execute ACS configuration commands. Whenever an administrator logs in to the configuration mode and executes a command that causes configurational changes in the ACS server, the information related to those changes is logged in the ACS operational logs. Table 1-7 lists the configuration mode commands that, when executed, generate operational logs. Table 1-6 Configuration Mode Commands for the Operation Log Command clock ip name-server hostname ip address ntp server Description Sets the system clock on the ACS server. Sets the DNS servers for use during a DNS query. Sets the hostname of the system. Sets the IP address and netmask for the Ethernet interface. Allows synchronization of the software clock by the NTP server for the system. You can view these logs, using the show acs-logs command. For more information on log file types and the information stored in each log file, see show acs-logs, page A-61. OL-18996-01 CLI Reference Guide for the Cisco Secure Access Control System 5.1 1-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

1-11
CLI Reference Guide for the Cisco Secure Access Control System 5.1
OL-18996-01
Chapter 1
Overview of the ACS Command Line Interface
CLI Audit
For detailed information on Configuration mode and submode commands, see
Understanding Command
Modes, page 2-6
.
CLI Audit
You must have administrator access to execute ACS configuration commands. Whenever an
administrator logs in to the configuration mode and executes a command that causes configurational
changes in the ACS server, the information related to those changes is logged in the ACS operational
logs.
Table 1-7
lists the configuration mode commands that, when executed, generate operational logs.
You can view these logs, using the
show acs-logs
command. For more information on log file types and
the information stored in each log file, see
show acs-logs, page A-61
.
kron occurrence
Schedule one or more Command Scheduler commands to run at a specific date
and time or a recurring level.
kron policy-list
Specifies a name for a Command Scheduler policy.
logging
Enables the system to forward logs to a remote system.
logging loglevel
Configures the log level for the
logging
command.
no
Disables or removes the function associated with the command.
ntp
Synchronizes the software clock through the NTP server for the system.
password-policy
Enables and configures the password policy.
repository
Enters the repository submode.
service
Specifies the type of service to manage.
snmp-server
community
Sets up the community access string to permit access to the Simple Network
Management Protocol (SNMP).
snmp-server contact
Configures the SNMP contact MIB value on the system.
snmp-server host
Sends SNMP traps to a remote system.
snmp-server location
Configures the SNMP location MIB value on the system.
username
Adds a user to the system with a password and a privilege level.
Table 1-5
Summary of Configuration Commands (continued)
Command
Description
Table 1-6
Configuration Mode Commands for the Operation Log
Command
Description
clock
Sets the system clock on the ACS server.
ip name-server
Sets the DNS servers for use during a DNS query.
hostname
Sets the hostname of the system.
ip address
Sets the IP address and netmask for the Ethernet interface.
ntp server
Allows synchronization of the software clock by the NTP server for the
system.