Contents 13
Secure HTTP Configuration . . . . . . . . . . . . 207
Secure Shell Configuration
. . . . . . . . . . . . . 210
Secure Public Key Configuration. . . . . . . . . . 211
Controlling Management Access (CLI) . . . . . . . . . 213
Configuring a Management Access List
. . . . . . 213
Adding Users to the Local Database . . . . . . . . 215
Configuring and Applying Authentication
Profiles
. . . . . . . . . . . . . . . . . . . . . . . 216
Managing Passwords . . . . . . . . . . . . . . . 217
Configuring RADIUS Server Information . . . . . . 219
Configuring TACACS+ Server Information . . . . . 221
Configuring Telnet and SSH Access
. . . . . . . . 222
Configuring HTTP and HTTPS Access
. . . . . . . 223
Configuring DoS Information
. . . . . . . . . . . . 225
Management Access Configuration Examples
. . . . . 227
Configuring a Management Access List
. . . . . . 227
Configuring the Primary and Secondary
RADIUS Servers
. . . . . . . . . . . . . . . . . . 228
Configuring an Authentication Profile . . . . . . . 230
Configuring Password Lockout. . . . . . . . . . . 231
10 Monitoring and Logging System
Information . . . . . . . . . . . . . . . . . . . . . . 235
System Monitoring Overview . . . . . . . . . . . . . . 235
What System Information Is Monitored?
. . . . . . 235
Why Is System Information Needed? . . . . . . . 236
Where Are Log Messages Sent?
. . . . . . . . . . 236
What Are the Severity Levels? . . . . . . . . . . . 237
What Are the System Startup and
Operation Logs?
. . . . . . . . . . . . . . . . . . 237