Using Hashes to Validate Software Images........................................................................................53
4 Switch Management.......................................................................................... 55
Configuring Privilege Levels................................................................................................................55
Creating a Custom Privilege Level................................................................................................55
Removing a Command from EXEC Mode....................................................................................55
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................55
Allowing Access to CONFIGURATION Mode Commands..........................................................56
Allowing Access to the Following Modes....................................................................................56
Applying a Privilege Level to a Username....................................................................................58
Applying a Privilege Level to a Terminal Line...............................................................................58
Configuring Logging...........................................................................................................................58
Audit and Security Logs.................................................................................................................59
Configuring Logging Format ......................................................................................................60
Setting Up a Secure Connection to a Syslog Server....................................................................61
Log Messages in the Internal Buffer...................................................................................................62
Configuration Task List for System Log Management.................................................................62
Disabling System Logging...................................................................................................................62
Sending System Messages to a Syslog Server....................................................................................63
Configuring a UNIX System as a Syslog Server............................................................................63
Display the Logging Buffer and the Logging Configuration.............................................................63
Changing System Logging Settings...................................................................................................64
Configuring a UNIX Logging Facility Level.........................................................................................65
Synchronizing Log Messages.............................................................................................................66
Enabling Timestamp on Syslog Messages.........................................................................................66
File Transfer Services...........................................................................................................................67
Configuration Task List for File Transfer Services........................................................................67
Enabling the FTP Server................................................................................................................67
Configuring FTP Server Parameters.............................................................................................68
Configuring FTP Client Parameters..............................................................................................68
Terminal Lines.....................................................................................................................................69
Denying and Permitting Access to a Terminal Line.....................................................................69
Configuring Login Authentication for Terminal Lines.................................................................70
Setting Time Out of EXEC Privilege Mode..........................................................................................71
Using Telnet to Access Another Network Device..............................................................................71
Lock CONFIGURATION Mode............................................................................................................72
Viewing the Configuration Lock Status........................................................................................72
Recovering from a Forgotten Password on the Z9500.....................................................................73
Ignoring the Startup Configuration and Booting from the Factory-Default Configuration............73
Recovering from a Failed Start on the Z9500....................................................................................74
Restoring Factory-Default Settings....................................................................................................74
Important Points to Remember....................................................................................................74