The following table lists the tasks necessary to configure system security and access functions and logging features. Each chapter in this book is presented in an overall logical configuration flow. Each section describes a software area and provides CLI syntax and command usage to configure parameters for a functional area.
Area | Task | Chapter |
---|---|---|
System security |
Configure system security parameters, such as authentication, authorization, and accounting |
|
Network management |
Configure SNMP elements |
|
Secure network management |
Configure NETCONF elements |
|
Operational functions |
Configure event and accounting logs |
|
Facility alarms |
Configure facility alarms |
|
Reference |
List of IEEE, IETF, and other proprietary entities |