This chapter provides process flow information to configure system security and access functions as well as event and accounting logs.
Table 1 lists the tasks necessary to configure system security and access functions and logging features.
Each chapter in this book is presented in an overall logical configuration flow. Each section describes a software area and provides CLI syntax and command usage to configure parameters for a functional area.
Area | Task | Chapter |
System security | Configure system security parameters, such as authentication, authorization, and accounting | |
Network management | Configure SNMP elements | |
Operational functions | Configure event and accounting logs | |
Reference | List of IEEE, IETF, and other proprietary entities |