Cisco CSACS-1121-K9 Reference Guide - Page 23
CLI Audit
View all Cisco CSACS-1121-K9 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 23 highlights
Chapter 1 Overview of the ACS Command Line Interface CLI Audit Table 1-5 Summary of Configuration Commands (continued) Command kron occurrence kron policy-list logging logging loglevel no ntp password-policy repository service snmp-server community snmp-server contact snmp-server host snmp-server location username Description Schedule one or more Command Scheduler commands to run at a specific date and time or a recurring level. Specifies a name for a Command Scheduler policy. Enables the system to forward logs to a remote system. Configures the log level for the logging command. Disables or removes the function associated with the command. Synchronizes the software clock through the NTP server for the system. Enables and configures the password policy. Enters the repository submode. Specifies the type of service to manage. Sets up the community access string to permit access to the Simple Network Management Protocol (SNMP). Configures the SNMP contact MIB value on the system. Sends SNMP traps to a remote system. Configures the SNMP location MIB value on the system. Adds a user to the system with a password and a privilege level. For detailed information on Configuration mode and submode commands, see Understanding Command Modes, page 2-6. CLI Audit You must have administrator access to execute ACS configuration commands. Whenever an administrator logs in to the configuration mode and executes a command that causes configurational changes in the ACS server, the information related to those changes is logged in the ACS operational logs. Table 1-7 lists the configuration mode commands that, when executed, generate operational logs. Table 1-6 Configuration Mode Commands for the Operation Log Command clock ip name-server hostname ip address ntp server Description Sets the system clock on the ACS server. Sets the DNS servers for use during a DNS query. Sets the hostname of the system. Sets the IP address and netmask for the Ethernet interface. Allows synchronization of the software clock by the NTP server for the system. You can view these logs, using the show acs-logs command. For more information on log file types and the information stored in each log file, see show acs-logs, page A-61. OL-18996-01 CLI Reference Guide for the Cisco Secure Access Control System 5.1 1-11