Removing a Command from EXEC Mode..................................................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 57
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 57
Allowing Access to Different Modes...........................................................................................................................57
Applying a Privilege Level to a Username...................................................................................................................59
Applying a Privilege Level to a Terminal Line............................................................................................................. 59
Configuring Logging............................................................................................................................................................59
Audit and Security Logs................................................................................................................................................59
Configuring Logging Format ................................................................................................................................. 61
Display the Logging Buffer and the Logging Configuration......................................................................................61
Setting Up a Secure Connection to a Syslog Server.......................................................................................62
Sending System Messages to a Syslog Server..........................................................................................................63
Track Login Activity............................................................................................................................................................ 63
Restrictions for Tracking Login Activity......................................................................................................................63
Configuring Login Activity Tracking............................................................................................................................ 63
Display Login Statistics................................................................................................................................................. 63
Limit Concurrent Login Sessions.......................................................................................................................................65
Restrictions for Limiting the Number of Concurrent Sessions................................................................................65
Configuring Concurrent Session Limit........................................................................................................................ 65
Enabling the System to Clear Existing Sessions........................................................................................................65
Enabling Secured CLI Mode...............................................................................................................................................66
Log Messages in the Internal Buffer.................................................................................................................................66
Disabling System Logging...................................................................................................................................................67
Sending System Messages to a Syslog Server................................................................................................................67
Configuring a UNIX System as a Syslog Server........................................................................................................ 67
Changing System Logging Settings.................................................................................................................................. 67
Display the Logging Buffer and the Logging Configuration...........................................................................................68
Configuring a UNIX Logging Facility Level.......................................................................................................................69
Synchronizing Log Messages............................................................................................................................................ 69
Enabling Timestamp on Syslog Messages........................................................................................................................70
File Transfer Services..........................................................................................................................................................73
Enabling the FTP Server...............................................................................................................................................73
Configuring FTP Server Parameters...........................................................................................................................73
Configuring FTP Client Parameters.............................................................................................................................74
Terminal Lines...................................................................................................................................................................... 74
Denying and Permitting Access to a Terminal Line................................................................................................... 74
Configuring Login Authentication for Terminal Lines................................................................................................75
Setting Timeout for EXEC Privilege Mode.......................................................................................................................76
Using Telnet to get to Another Network Device.............................................................................................................76
Lock CONFIGURATION Mode...........................................................................................................................................77
Viewing the Reason for Last System Reboot.................................................................................................................. 77
5 802.1X....................................................................................................................................... 79
Port-Authentication Process............................................................................................................................................. 80
EAP over RADIUS.......................................................................................................................................................... 81
Configuring 802.1X...............................................................................................................................................................81
Important Points to Remember.........................................................................................................................................82
Enabling 802.1X....................................................................................................................................................................82
Configuring dot1x Profile ................................................................................................................................................... 83
Configuring MAC addresses for a do1x Profile................................................................................................................84
4
Contents