Using Hashes to Verify Software Images Before Installation............................................................ 55
4 Management........................................................................................................57
Configuring Privilege Levels................................................................................................................57
Creating a Custom Privilege Level................................................................................................57
Removing a Command from EXEC Mode....................................................................................57
Moving a Command from EXEC Privilege Mode to EXEC Mode................................................ 58
Allowing Access to CONFIGURATION Mode Commands.......................................................... 58
Allowing Access to Different Modes............................................................................................ 58
Applying a Privilege Level to a Username.................................................................................... 60
Applying a Privilege Level to a Terminal Line...............................................................................60
Configuring Logging...........................................................................................................................60
Audit and Security Logs.................................................................................................................61
Configuring Logging Format ...................................................................................................... 62
Setting Up a Secure Connection to a Syslog Server....................................................................63
Log Messages in the Internal Buffer...................................................................................................64
Configuration Task List for System Log Management................................................................ 64
Disabling System Logging.................................................................................................................. 64
Sending System Messages to a Syslog Server....................................................................................65
Configuring a UNIX System as a Syslog Server............................................................................65
Track Login Activity.............................................................................................................................65
Restrictions for Tracking Login Activity........................................................................................65
Configuring Login Activity Tracking............................................................................................. 66
Display Login Statistics..................................................................................................................66
Limit Concurrent Login Sessions........................................................................................................67
Restrictions for Limiting the Number of Concurrent Sessions....................................................67
Configuring Concurrent Session Limit......................................................................................... 67
Enabling the System to Clear Existing Sessions...........................................................................68
Changing System Logging Settings................................................................................................... 69
Display the Logging Buffer and the Logging Configuration............................................................. 70
Configuring a UNIX Logging Facility Level.........................................................................................70
Synchronizing Log Messages..............................................................................................................72
Enabling Timestamp on Syslog Messages..........................................................................................72
File Transfer Services...........................................................................................................................73
Configuration Task List for File Transfer Services........................................................................ 73
Enabling the FTP Server.................................................................................................................73
Configuring FTP Server Parameters..............................................................................................73
Configuring FTP Client Parameters.............................................................................................. 74
Terminal Lines..................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line..................................................................... 75
Configuring Login Authentication for Terminal Lines................................................................. 76
Setting Timeout for EXEC Privilege Mode.......................................................................................... 77
4