Verify Software Images Before Installation
...................................................................................................................
53
4 Management
...............................................................................................................................................
55
Configuring
Privilege Levels
...........................................................................................................................................
55
Creating a Custom Privilege Level
...........................................................................................................................
55
Removing a Command from EXEC Mode
..............................................................................................................
56
Moving a Command from EXEC Privilege Mode to EXEC Mode
.......................................................................
56
Allowing Access to CONFIGURATION Mode Commands
....................................................................................
56
Allowing Access to
Different
Modes
........................................................................................................................
56
Applying a Privilege Level to a Username
...............................................................................................................
58
Applying a Privilege Level to a Terminal Line
..........................................................................................................
58
Configuring
Logging
........................................................................................................................................................
58
Audit and Security Logs
............................................................................................................................................
59
Configuring
Logging Format
...................................................................................................................................
60
Display the Logging
Buffer
and the Logging
Configuration
...................................................................................
61
Setting Up a Secure Connection to a Syslog Server
.............................................................................................
61
Log Messages in the Internal
Buffer
..............................................................................................................................
63
Configuration
Task List for System Log Management
..........................................................................................
63
Disabling System Logging
...............................................................................................................................................
63
Sending System Messages to a Syslog Server
............................................................................................................
63
Configuring
a UNIX System as a Syslog Server
.....................................................................................................
63
Track Login Activity
.........................................................................................................................................................
64
Restrictions for Tracking Login Activity
...................................................................................................................
64
Configuring
Login Activity Tracking
.........................................................................................................................
64
Display Login Statistics
..............................................................................................................................................
65
Limit Concurrent Login Sessions
....................................................................................................................................
66
Restrictions for Limiting the Number of Concurrent Sessions
............................................................................
66
Configuring
Concurrent Session Limit
.....................................................................................................................
66
Enabling the System to Clear Existing Sessions
....................................................................................................
67
Changing System Logging Settings
...............................................................................................................................
67
Display the Logging
Buffer
and the Logging
Configuration
........................................................................................
68
Configuring
a UNIX Logging Facility Level
....................................................................................................................
69
Synchronizing Log Messages
.........................................................................................................................................
70
Enabling Timestamp on Syslog Messages
....................................................................................................................
70
File Transfer Services
.......................................................................................................................................................
71
Configuration
Task List for File Transfer Services
...................................................................................................
71
Enabling the FTP Server
............................................................................................................................................
71
Configuring
FTP Server Parameters
........................................................................................................................
72
Configuring
FTP Client Parameters
.........................................................................................................................
72
Terminal Lines
...................................................................................................................................................................
73
Denying and Permitting Access to a Terminal Line
................................................................................................
73
Configuring
Login Authentication for Terminal Lines
.............................................................................................
74
Setting Timeout for EXEC Privilege Mode
...................................................................................................................
75
Using Telnet to get to Another Network Device
..........................................................................................................
75
Lock CONFIGURATION Mode
.......................................................................................................................................
76
Viewing the
Configuration
Lock Status
...................................................................................................................
76
Recovering from a Forgotten Password
.......................................................................................................................
76
4
Contents