Using Hashes to Validate Software Images........................................................................................58
4 Management.......................................................................................................60Configuring Privilege Levels...............................................................................................................60
Creating a Custom Privilege Level...............................................................................................60
Removing a Command from EXEC Mode...................................................................................60
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................61
Allowing Access to CONFIGURATION Mode Commands...........................................................61
Allowing Access to the Following Modes.....................................................................................61
Applying a Privilege Level to a Username....................................................................................63
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs................................................................................................................64
Configuring Logging Format ......................................................................................................66
Setting Up a Secure Connection to a Syslog Server....................................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................68
Disabling System Logging..................................................................................................................68
Sending System Messages to a Syslog Server...................................................................................69
Configuring a UNIX System as a Syslog Server............................................................................69
Track Login Activity.............................................................................................................................69
Restrictions for Tracking Login Activity........................................................................................69
Configuring Login Activity Tracking.............................................................................................70
Display Login Statistics..................................................................................................................70
Limit Concurrent Login Sessions........................................................................................................71
Restrictions for Limiting the Number of Concurrent Sessions....................................................71
Configuring Concurrent Session Limit..........................................................................................71
Enabling the System to Clear Existing Sessions...........................................................................72
Changing System Logging Settings....................................................................................................73
Display the Logging Buffer and the Logging Configuration..............................................................74
Configuring a UNIX Logging Facility Level.........................................................................................74
Synchronizing Log Messages..............................................................................................................76
Enabling Timestamp on Syslog Messages..........................................................................................76
File Transfer Services...........................................................................................................................77
Configuration Task List for File Transfer Services........................................................................77
Enabling the FTP Server.................................................................................................................77
Configuring FTP Server Parameters..............................................................................................78
Configuring FTP Client Parameters..............................................................................................78
Terminal Lines.....................................................................................................................................79
Denying and Permitting Access to a Terminal Line.....................................................................79
Configuring Login Authentication for Terminal Lines.................................................................80
Setting Time Out of EXEC Privilege Mode..........................................................................................81
4