Using Hashes to Validate Software Images........................................................................................58
4 Management....................................................................................................... 60
Configuring Privilege Levels............................................................................................................... 60
Creating a Custom Privilege Level............................................................................................... 60
Removing a Command from EXEC Mode................................................................................... 60
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 61
Allowing Access to CONFIGURATION Mode Commands...........................................................61
Allowing Access to the Following Modes.....................................................................................61
Applying a Privilege Level to a Username.................................................................................... 63
Applying a Privilege Level to a Terminal Line...............................................................................63
Configuring Logging...........................................................................................................................63
Audit and Security Logs................................................................................................................ 64
Configuring Logging Format ...................................................................................................... 66
Setting Up a Secure Connection to a Syslog Server....................................................................67
Log Messages in the Internal Buffer...................................................................................................68
Configuration Task List for System Log Management................................................................ 68
Disabling System Logging.................................................................................................................. 68
Sending System Messages to a Syslog Server................................................................................... 69
Configuring a UNIX System as a Syslog Server............................................................................69
Track Login Activity.............................................................................................................................69
Restrictions for Tracking Login Activity........................................................................................69
Configuring Login Activity Tracking............................................................................................. 70
Display Login Statistics..................................................................................................................70
Limit Concurrent Login Sessions........................................................................................................ 71
Restrictions for Limiting the Number of Concurrent Sessions.................................................... 71
Configuring Concurrent Session Limit..........................................................................................71
Enabling the System to Clear Existing Sessions........................................................................... 72
Changing System Logging Settings....................................................................................................73
Display the Logging Buffer and the Logging Configuration..............................................................74
Configuring a UNIX Logging Facility Level.........................................................................................74
Synchronizing Log Messages..............................................................................................................76
Enabling Timestamp on Syslog Messages..........................................................................................76
File Transfer Services........................................................................................................................... 77
Configuration Task List for File Transfer Services........................................................................ 77
Enabling the FTP Server.................................................................................................................77
Configuring FTP Server Parameters..............................................................................................78
Configuring FTP Client Parameters.............................................................................................. 78
Terminal Lines..................................................................................................................................... 79
Denying and Permitting Access to a Terminal Line..................................................................... 79
Configuring Login Authentication for Terminal Lines.................................................................80
Setting Time Out of EXEC Privilege Mode..........................................................................................81
4