Removing a Command from EXEC Mode..............................................................................................................58
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 58
Allowing Access to CONFIGURATION Mode Commands................................................................................. 58
Allowing Access to Different Modes...................................................................................................................... 58
Applying a Privilege Level to a Username............................................................................................................. 60
Applying a Privilege Level to a Terminal Line....................................................................................................... 60
Configuring Logging......................................................................................................................................................... 60
Audit and Security Logs.............................................................................................................................................60
Configuring Logging Format .............................................................................................................................62
Display the Logging Buffer and the Logging Configuration..............................................................................62
Setting Up a Secure Connection to a Syslog Server.................................................................................63
Sending System Messages to a Syslog Server.................................................................................................... 64
Track Login Activity..........................................................................................................................................................64
Restrictions for Tracking Login Activity................................................................................................................ 64
Configuring Login Activity Tracking........................................................................................................................64
Display Login Statistics.............................................................................................................................................. 65
Limit Concurrent Login Sessions...................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 66
Configuring Concurrent Session Limit....................................................................................................................67
Enabling the System to Clear Existing Sessions.................................................................................................. 67
Enabling Secured CLI Mode............................................................................................................................................68
Log Messages in the Internal Buffer............................................................................................................................ 68
Disabling System Logging............................................................................................................................................... 68
Sending System Messages to a Syslog Server..........................................................................................................69
Configuring a UNIX System as a Syslog Server...................................................................................................69
Changing System Logging Settings..............................................................................................................................69
Display the Logging Buffer and the Logging Configuration....................................................................................70
Configuring a UNIX Logging Facility Level..................................................................................................................70
Synchronizing Log Messages.......................................................................................................................................... 71
Enabling Timestamp on Syslog Messages................................................................................................................... 72
File Transfer Services.......................................................................................................................................................74
Enabling the FTP Server............................................................................................................................................75
Configuring FTP Server Parameters.......................................................................................................................75
Configuring FTP Client Parameters........................................................................................................................ 76
Terminal Lines.....................................................................................................................................................................76
Denying and Permitting Access to a Terminal Line............................................................................................. 76
Configuring Login Authentication for Terminal Lines..........................................................................................77
Setting Timeout for EXEC Privilege Mode..................................................................................................................78
Using Telnet to get to Another Network Device....................................................................................................... 78
Lock CONFIGURATION Mode........................................................................................................................................79
Viewing the Reason for Last System Reboot............................................................................................................ 80
Chapter 5: 802.1X........................................................................................................................ 81
Port-Authentication Process..........................................................................................................................................82
EAP over RADIUS........................................................................................................................................................83
Configuring 802.1X............................................................................................................................................................84
Important Points to Remember..................................................................................................................................... 84
Enabling 802.1X................................................................................................................................................................. 85
Configuring dot1x Profile ................................................................................................................................................86
Configuring MAC addresses for a do1x Profile.......................................................................................................... 86
4
Contents