Removing a Command from EXEC Mode..............................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode.................................................................... 57
Allowing Access to CONFIGURATION Mode Commands..................................................................................57
Allowing Access to Different Modes.......................................................................................................................57
Applying a Privilege Level to a Username............................................................................................................. 59
Applying a Privilege Level to a Terminal Line....................................................................................................... 59
Configuring Logging......................................................................................................................................................... 59
Audit and Security Logs.............................................................................................................................................59
Configuring Logging Format ..............................................................................................................................61
Display the Logging Buffer and the Logging Configuration...............................................................................61
Setting Up a Secure Connection to a Syslog Server................................................................................ 62
Sending System Messages to a Syslog Server.................................................................................................... 63
Track Login Activity..........................................................................................................................................................63
Restrictions for Tracking Login Activity................................................................................................................ 63
Configuring Login Activity Tracking........................................................................................................................63
Display Login Statistics.............................................................................................................................................. 64
Limit Concurrent Login Sessions...................................................................................................................................65
Restrictions for Limiting the Number of Concurrent Sessions........................................................................ 65
Configuring Concurrent Session Limit................................................................................................................... 65
Enabling the System to Clear Existing Sessions..................................................................................................66
Enabling Secured CLI Mode........................................................................................................................................... 66
Log Messages in the Internal Buffer.............................................................................................................................67
Disabling System Logging................................................................................................................................................67
Sending System Messages to a Syslog Server.......................................................................................................... 67
Configuring a UNIX System as a Syslog Server...................................................................................................67
Changing System Logging Settings..............................................................................................................................68
Display the Logging Buffer and the Logging Configuration....................................................................................68
Configuring a UNIX Logging Facility Level..................................................................................................................69
Synchronizing Log Messages......................................................................................................................................... 70
Enabling Timestamp on Syslog Messages...................................................................................................................70
File Transfer Services........................................................................................................................................................71
Enabling the FTP Server.............................................................................................................................................71
Configuring FTP Server Parameters........................................................................................................................71
Configuring FTP Client Parameters........................................................................................................................ 72
Terminal Lines.....................................................................................................................................................................72
Denying and Permitting Access to a Terminal Line............................................................................................. 72
Configuring Login Authentication for Terminal Lines..........................................................................................73
Setting Timeout for EXEC Privilege Mode..................................................................................................................74
Using Telnet to get to Another Network Device....................................................................................................... 74
Lock CONFIGURATION Mode....................................................................................................................................... 75
Viewing the Reason for Last System Reboot.............................................................................................................76
Chapter 5: 802.1X........................................................................................................................77
Port-Authentication Process..........................................................................................................................................78
EAP over RADIUS........................................................................................................................................................79
Configuring 802.1X............................................................................................................................................................80
Important Points to Remember..................................................................................................................................... 80
Enabling 802.1X.................................................................................................................................................................. 81
Configuring dot1x Profile ................................................................................................................................................82
Configuring MAC addresses for a do1x Profile.......................................................................................................... 82
4
Contents