Brocade Multi-Service IronWare Security Configuration Guid Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačové příslušenství Brocade Multi-Service IronWare Security Configuration Guid. Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 370
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Multi-Service IronWare

53-1003035-0209 December, 2013 ®53-1003035-02Multi-Service IronWareSecurity Configuration GuideSupporting Multi-Service IronWare R05.6.00

Strany 2 - Document History

x Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying multi-device port authentication information . . . . . . . .279Displaying

Strany 3 - Contents

82 Multi-Service IronWare Security Configuration Guide53-1003035-02Creating a numbered Layer-2 ACL table2Brocade(config)# access-list 401 sequence 23

Strany 4

Multi-Service IronWare Security Configuration Guide 8353-1003035-02Creating a numbered Layer-2 ACL table2Using the mask, you can make the access list

Strany 5

84 Multi-Service IronWare Security Configuration Guide53-1003035-02Creating a numbered Layer-2 ACL table2The Brocade NetIron CES and Brocade NetIron C

Strany 6 - Chapter 3 Access Control List

Multi-Service IronWare Security Configuration Guide 8553-1003035-02Creating a numbered Layer-2 ACL table2In the following example, access list 414 per

Strany 7

86 Multi-Service IronWare Security Configuration Guide53-1003035-02Creating a named Layer-2 ACL table2Creating a named Layer-2 ACL tableTo create for

Strany 8

Multi-Service IronWare Security Configuration Guide 8753-1003035-02ACL accounting2ACL accountingMulti-Service devices may be configured to monitor the

Strany 9

88 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying Layer-2 ACLs2For detailed information about ACL accounting consideration

Strany 10 - 53-1003035-02

Multi-Service IronWare Security Configuration Guide 8953-1003035-02Displaying Layer-2 ACLs210: deny 0000.0030.0310 ffff.ffff.ffff 0000.0030.0010 ffff.

Strany 11

90 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying Layer-2 ACLs2 permit vlan 3000 ip any anySyntax: [no] display-config-for

Strany 12

Multi-Service IronWare Security Configuration Guide 9153-1003035-02Displaying Layer-2 ACLs2Displaying Layer-2 ACL statistics on Brocade NetIron CES an

Strany 13 - About This Document

Multi-Service IronWare Security Configuration Guide xi53-1003035-02Configuring 802.1x port security . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 14 - Supported software

92 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying Layer-2 ACLs2

Strany 15 - Document conventions

Multi-Service IronWare Security Configuration Guide 9353-1003035-02Chapter3Access Control ListTable 14 displays the individual Brocade devices and the

Strany 16 - Related publications

94 Multi-Service IronWare Security Configuration Guide53-1003035-02Access Control List3This chapter discusses the IPv4 Access Control List (ACL) featu

Strany 17 - In this chapter

Multi-Service IronWare Security Configuration Guide 9553-1003035-02How the Brocade device processes ACLs3How the Brocade device processes ACLsThe Broc

Strany 18

96 Multi-Service IronWare Security Configuration Guide53-1003035-02How the Brocade device processes ACLs3NOTEFor all NetIron devices running any previ

Strany 19

Multi-Service IronWare Security Configuration Guide 9753-1003035-02Disabling outbound ACLs for switching traffic3Disabling outbound ACLs for switching

Strany 20

98 Multi-Service IronWare Security Configuration Guide53-1003035-02Default ACL action3The ipv4 and ipv6 options are mutually exclusive within the same

Strany 21 - Securing access methods

Multi-Service IronWare Security Configuration Guide 9953-1003035-02Types of IP ACLs3Types of IP ACLsIP ACLs can be configured as standard or extended

Strany 22

100 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL IDs and entries3• ncopy tftp ip-addr from-name running-config In this case, th

Strany 23

Multi-Service IronWare Security Configuration Guide 10153-1003035-02Configuring numbered and named ACLs3Syntax: [no] suppress-acl-seqThe no version of

Strany 24

xii Multi-Service IronWare Security Configuration Guide53-1003035-02Chapter 10 Securing SNMP AccessEstablishing SNMP community strings . . . . . . . .

Strany 25 - Example

102 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3sequence number generated by the system is the

Strany 26

Multi-Service IronWare Security Configuration Guide 10353-1003035-02Configuring numbered and named ACLs3Deleting a standard numbered ACL entryYou can

Strany 27

104 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3Parameters for regenerating IPv4 ACL table seq

Strany 28 - • SNMP access

Multi-Service IronWare Security Configuration Guide 10553-1003035-02Configuring numbered and named ACLs3Parameters to bind standard ACLs to an interfa

Strany 29 - Defining the Telnet idle time

106 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3Here is another example of commands for config

Strany 30 - • TFTP access

Multi-Service IronWare Security Configuration Guide 10753-1003035-02Configuring numbered and named ACLs3The fifth entry permits all packets that are n

Strany 31

108 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3access-list 100 permit icmp any anyExtended AC

Strany 32 - Enabling Telnet access

Multi-Service IronWare Security Configuration Guide 10953-1003035-02Configuring numbered and named ACLs3wildcard Specifies the portion of the source I

Strany 33 - Enabling SNMP access

110 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3Parameters to filter TCP or UDP packetsUse the

Strany 34 - Setting passwords

Multi-Service IronWare Security Configuration Guide 11153-1003035-02Configuring numbered and named ACLs3operator Specifies a comparison operator for t

Strany 35

Multi-Service IronWare Security Configuration Guide xiii53-1003035-02About This DocumentIn this chapter•Audience. . . . . . . . . . . . . . . . . . .

Strany 36

112 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3Filtering traffic with ICMP packetsUse the fol

Strany 37

Multi-Service IronWare Security Configuration Guide 11353-1003035-02Configuring numbered and named ACLs3precedence name | num The precedence option

Strany 38 - Disabling password encryption

114 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3Using ACL QoS options to filter packetsYou can

Strany 39

Multi-Service IronWare Security Configuration Guide 11553-1003035-02Configuring numbered and named ACLs3Please note, the behavior of an implicit deny

Strany 40 - Regular password rules

116 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3Configuration example for standard ACLTo confi

Strany 41 - Strict password rules

Multi-Service IronWare Security Configuration Guide 11753-1003035-02Configuring numbered and named ACLs33. Enter the show access-list command to displ

Strany 42 - Setting passwords to expire

118 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring numbered and named ACLs3NOTE The command prompt changes after you ente

Strany 43 - Login lockout

Multi-Service IronWare Security Configuration Guide 11953-1003035-02Configuring numbered and named ACLs3Brocade(config)#show access-list 99ACL configu

Strany 44 - Web interface login lockout

120 Multi-Service IronWare Security Configuration Guide53-1003035-02Simultaneous per VLAN rate limit and QoS3This shall not affect CAM occupation, tha

Strany 45 - Management Interface

Multi-Service IronWare Security Configuration Guide 12153-1003035-02Modifying ACLs3Modifying ACLsWhen you configure any ACL, a sequence number is assi

Strany 46 - Generating an SSL certificate

xiv Multi-Service IronWare Security Configuration Guide53-1003035-02In this chapterSupported hardware and softwareThe following hardware platforms are

Strany 47

122 Multi-Service IronWare Security Configuration Guide53-1003035-02Modifying ACLs3Modify an ACL by configuring an ACL list on a file server.1. Use a

Strany 48 - TACACS+ authorization

Multi-Service IronWare Security Configuration Guide 12353-1003035-02Modifying ACLs3Adding or deleting a comment You can add or delete comments to an I

Strany 49 - TACACS+ accounting

124 Multi-Service IronWare Security Configuration Guide53-1003035-02Modifying ACLs3Complete the syntax by specifying any options you want for the ACL

Strany 50

Multi-Service IronWare Security Configuration Guide 12553-1003035-02Applying ACLs to interfaces3Enter deny to deny the specified traffic or permit to

Strany 51

126 Multi-Service IronWare Security Configuration Guide53-1003035-02Applying ACLs to interfaces3Brocade(config)# vlan 10 name IP-subnet-vlanBrocade(co

Strany 52

Multi-Service IronWare Security Configuration Guide 12753-1003035-02Enabling ACL duplication check3mac access-list SampleACL permit any any 10 etype a

Strany 53 - TACACS functions

128 Multi-Service IronWare Security Configuration Guide53-1003035-02Enabling ACL conflict check3Syntax: [no] acl-duplication-checkEnabling ACL conflic

Strany 54 - Setting the TACACS+ key

Multi-Service IronWare Security Configuration Guide 12953-1003035-02Enabling ACL filtering of fragmented or non-fragmented packets3Named ACLsBrocade(c

Strany 55 - TACACS or TACACS+

130 Multi-Service IronWare Security Configuration Guide53-1003035-02Enabling ACL filtering of fragmented or non-fragmented packets3This can be a parti

Strany 56 - Telnet or SSH login

Multi-Service IronWare Security Configuration Guide 13153-1003035-02Enabling ACL filtering of fragmented or non-fragmented packets3ACL entries with La

Strany 57 - Example 1:

Multi-Service IronWare Security Configuration Guide xv53-1003035-02In this chapterDocument conventionsThis section describes text formatting conventio

Strany 58

132 Multi-Service IronWare Security Configuration Guide53-1003035-02Enabling ACL filtering of fragmented or non-fragmented packets3Configuring the con

Strany 59

Multi-Service IronWare Security Configuration Guide 13353-1003035-02Enabling ACL filtering of fragmented or non-fragmented packets3Non-fragmented pack

Strany 60

134 Multi-Service IronWare Security Configuration Guide53-1003035-02Enabling ACL filtering of fragmented or non-fragmented packets3Brocade(config-if-e

Strany 61 - (shell) access

Multi-Service IronWare Security Configuration Guide 13553-1003035-02ACL filtering for traffic switched within a virtual routing interface3Behavior In

Strany 62 - TACACS or TACACS+ packets

136 Multi-Service IronWare Security Configuration Guide53-1003035-02Filtering and priority manipulation based on 802.1p priority3• 4 – qosp4• 5 – qosp

Strany 63

Multi-Service IronWare Security Configuration Guide 13753-1003035-02ICMP filtering for extended ACLs3Brocade(config)# access-list 100 permit udp 10.1.

Strany 64

138 Multi-Service IronWare Security Configuration Guide53-1003035-02ICMP filtering for extended ACLs3The acl-name | acl-num parameter allows you to sp

Strany 65

Multi-Service IronWare Security Configuration Guide 13953-1003035-02Binding IPv4 inbound ACLs to a management port3Binding IPv4 inbound ACLs to a mana

Strany 66

140 Multi-Service IronWare Security Configuration Guide53-1003035-02IP broadcast ACL3NOTEFor IPv4 inbound ACL applied to management port, the user can

Strany 67 - Configuring RADIUS security

Multi-Service IronWare Security Configuration Guide 14153-1003035-02IP broadcast ACL3• For LAG ports, all ports within the LAG are required to have th

Strany 68 - • A list of commands

xvi Multi-Service IronWare Security Configuration Guide53-1003035-02In this chapterNotice to the readerThis document may contain references to the tra

Strany 69 - RADIUS accounting

142 Multi-Service IronWare Security Configuration Guide53-1003035-02IP broadcast ACL3The no option is used to disable filtering of directed broadcast

Strany 70 - AAA operations for RADIUS

Multi-Service IronWare Security Configuration Guide 14353-1003035-02IP broadcast ACL3Brocade(config-if-e1000-4/1)# show access-list subnet-broadcast a

Strany 71

144 Multi-Service IronWare Security Configuration Guide53-1003035-02IP broadcast ACL CAM3Syntax: show access-list subnet-broadcast accounting globalTa

Strany 72

Multi-Service IronWare Security Configuration Guide 14553-1003035-02IP broadcast ACL CAM3NOTEHitless upgrade support for the IP broadcast ACL CAM entr

Strany 73

146 Multi-Service IronWare Security Configuration Guide53-1003035-02IP receive ACLs3Rebinding of IP broadcast ACL CAM entriesTo rebind IP broadcast AC

Strany 74

Multi-Service IronWare Security Configuration Guide 14753-1003035-02IP receive ACLs3• deny icmp host 10.1.1.1 host 10.2.2.2• deny icmp host 10.1.1.1 h

Strany 75 - AAA functions

148 Multi-Service IronWare Security Configuration Guide53-1003035-02IP receive ACLs3NOTEAn implicit deny ip any any will be programmed at the end, aft

Strany 76 - Radius health check

Multi-Service IronWare Security Configuration Guide 14953-1003035-02IP receive ACLs3Syntax: [no] ip receive access-list {acl-num | acl-name} sequence

Strany 77

150 Multi-Service IronWare Security Configuration Guide53-1003035-02IP receive ACLs3NOTES: The following limitations apply when the number variable ha

Strany 78 - Setting the timeout parameter

Multi-Service IronWare Security Configuration Guide 15153-1003035-02IP receive ACLs3Displaying accounting information for rACL To display rACL account

Strany 79

Multi-Service IronWare Security Configuration Guide xvii53-1003035-02In this chapterGetting technical help or reporting errorsTo contact Technical Sup

Strany 80

152 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL CAM sharing for inbound ACLs for IPv4 ACLs (Brocade NetIron XMR and Brocade ML

Strany 81

Multi-Service IronWare Security Configuration Guide 15353-1003035-02Matching on TCP header flags for IPv4 ACLs3Matching on TCP header flags for IPv4 A

Strany 82 - Configuring RADIUS accounting

154 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL deny logging3• On Brocade NetIron CES and Brocade NetIron CER devices, ACL Den

Strany 83 - RADIUS packets

Multi-Service IronWare Security Configuration Guide 15553-1003035-02ACL deny logging3Configuring ACL deny logging for IPv4 ACLsConfiguring ACL Deny Lo

Strany 84

156 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL deny logging3NOTEUsing this command, ACL logging can be enabled and disabled d

Strany 85

Multi-Service IronWare Security Configuration Guide 15753-1003035-02ACL accounting3Log exampleThe following examples display typical log entries where

Strany 86

158 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL accounting3ACL accounting on Brocade NetIron CES and Brocade NetIron CER devic

Strany 87

Multi-Service IronWare Security Configuration Guide 15953-1003035-02ACL accounting3ACL deny logging and ACL accountingOn Brocade NetIron CES and Broca

Strany 88

160 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL accounting3Displaying statistics for an interfaceTo display statistics for an

Strany 89 - Method parameter Description

Multi-Service IronWare Security Configuration Guide 16153-1003035-02Commands3The policy-based-routing parameter limits the display to policy-based rou

Strany 90

xviii Multi-Service IronWare Security Configuration Guide53-1003035-02In this chapter

Strany 91 - Layer 2 Access Control Lists

162 Multi-Service IronWare Security Configuration Guide53-1003035-02clear access-list receive accounting3clear access-list receive accountingClears IP

Strany 92 - Configuration rules and notes

Multi-Service IronWare Security Configuration Guide 16353-1003035-02ip receive access-list3ip receive access-listConfigures an IPv4 access-control lis

Strany 93 - Types of Layer-2 ACLs

164 Multi-Service IronWare Security Configuration Guide53-1003035-02ip receive access-list3HistoryRelatedCommandsclear access-list receive accounting

Strany 94 - Brocade(config)# acl-policy

Multi-Service IronWare Security Configuration Guide 16553-1003035-02ip receive deactivate-acl-all3ip receive deactivate-acl-allDeactivates the IPv4 re

Strany 95

166 Multi-Service IronWare Security Configuration Guide53-1003035-02ip receive delete-acl-all3ip receive delete-acl-allDeletes IPv4 receive access-con

Strany 96

Multi-Service IronWare Security Configuration Guide 16753-1003035-02ip receive rebind-acl-all3ip receive rebind-acl-allRebinds an IPv4 receive access-

Strany 97

168 Multi-Service IronWare Security Configuration Guide53-1003035-02show access-list bindings3show access-list bindingsDisplays all IPv4 access-lists

Strany 98

Multi-Service IronWare Security Configuration Guide 16953-1003035-02show access-list receive accounting3show access-list receive accounting Displays a

Strany 99

170 Multi-Service IronWare Security Configuration Guide53-1003035-02suppress-acl-seq3suppress-acl-seqHides or suppresses the display and storage of se

Strany 100

Multi-Service IronWare Security Configuration Guide 17153-1003035-02Chapter4Configuring an IPv6 Access Control ListTable 24 displays the individual Br

Strany 101 - Using the priority option

Multi-Service IronWare Security Configuration Guide 153-1003035-02Chapter1Securing Access to Management FunctionsTable 2 displays the individual Broca

Strany 102

172 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 Access Control List4Brocade devices support IPv6 access contro

Strany 103

Multi-Service IronWare Security Configuration Guide 17353-1003035-02Configuring an IPv6 Access Control List4IPv6 ACLs also support the filtering of pa

Strany 104

174 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 Access Control List4• Remove the IPv6 outbound ACL from a VPLS

Strany 105 - ACL accounting

Multi-Service IronWare Security Configuration Guide 17553-1003035-02Configuring an IPv6 Access Control List4The following example displays show access

Strany 106 - Displaying Layer-2 ACLs

176 Multi-Service IronWare Security Configuration Guide53-1003035-02Using IPv6 ACLs as input to other features4 remark-entry sequence 7 permit all ip

Strany 107 - MLX series devices

Multi-Service IronWare Security Configuration Guide 17753-1003035-02Configuring an IPv6 ACL4• Control access to and from a Brocade device.Example conf

Strany 108 - permit vlan 3000 ip any any

178 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4The first condition in this ACL denies TCP traffic from th

Strany 109 - NetIron CER devices

Multi-Service IronWare Security Configuration Guide 17953-1003035-02Configuring an IPv6 ACL4Brocade(config)#access-list 101 deny ipv6 any anyIn the ab

Strany 110

180 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4The first permit statement permits ICMP traffic from hosts

Strany 111 - Access Control List

Multi-Service IronWare Security Configuration Guide 18153-1003035-02Configuring an IPv6 ACL4Deleting an IPv6 ACL entryYou can delete an ACL filter rul

Strany 112

Copyright © 2013 Brocade Communications Systems, Inc. All Rights Reserved.ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, I

Strany 113

2 Multi-Service IronWare Security Configuration Guide53-1003035-02Securing Access to Management Functions1By default, the Brocade devices have all man

Strany 114

182 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4TABLE 25 Syntax descriptionsIPv6 ACL arguments Description

Strany 115 - Brocade NetIron CER

Multi-Service IronWare Security Configuration Guide 18353-1003035-02Configuring an IPv6 ACL4source-ipv6_address The host source-ipv6-address parameter

Strany 116 - Default ACL action

184 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4For ICMPSyntax: [no] ipv6 access-list acl nameSyntax: [no]

Strany 117 - ACL IDs and entries

Multi-Service IronWare Security Configuration Guide 18553-1003035-02Configuring an IPv6 ACL4The icmp protocol indicates the you are filtering ICMP pac

Strany 118

186 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4NOTERefer to “Configuration considerations for IPv6 ACL an

Strany 119

Multi-Service IronWare Security Configuration Guide 18753-1003035-02Configuring an IPv6 ACL4any When specified instead of the ipv6-source-prefix/pref

Strany 120

188 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4For TCPSyntax: [no] ipv6 access-list acl nameSyntax: [no]

Strany 121 - Standard ACL syntax

Multi-Service IronWare Security Configuration Guide 18953-1003035-02Configuring an IPv6 ACL4TABLE 27 Syntax descriptions IPv6 ACL arguments Descriptio

Strany 122

190 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4source-ipv6_address The host source-ipv6-address parameter

Strany 123 - Brocade(config)# write memory

Multi-Service IronWare Security Configuration Guide 19153-1003035-02Configuring an IPv6 ACL4 tcp-udp-operator The tcp-udp-operator parameter can be on

Strany 124

Multi-Service IronWare Security Configuration Guide 353-1003035-02Securing access methods1NOTEFor the Brocade devices, RADIUS Challenge is supported f

Strany 125

192 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4NOTERefer to “Configuration considerations for IPv6 ACL an

Strany 126 - Extended ACL syntax

Multi-Service IronWare Security Configuration Guide 19353-1003035-02Configuring an IPv6 ACL4TABLE 28 Syntax descriptions (Continued)IPv6 ACL arguments

Strany 127 - ACL entry

194 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring an IPv6 ACL4host Allows you specify a host IPv6 address. When you use

Strany 128

Multi-Service IronWare Security Configuration Guide 19553-1003035-02Configuring an IPv6 ACL4Filtering packets based on DSCP valuesTo filter packets ba

Strany 129

196 Multi-Service IronWare Security Configuration Guide53-1003035-02Extended IPv6 ACLs4Syntax: [no] ipv6 access-list name deny | permitrouting-header-

Strany 130

Multi-Service IronWare Security Configuration Guide 19753-1003035-02Extended IPv6 ACLs4• The following actions are available for the ingress ACL:- Per

Strany 131

198 Multi-Service IronWare Security Configuration Guide53-1003035-02Extended IPv6 ACLs4Syntax: [no] [sequence num] permit | deny protocolipv6-source-p

Strany 132

Multi-Service IronWare Security Configuration Guide 19953-1003035-02Extended IPv6 ACLs4• dscp – Applies to packets that match the traffic class value

Strany 133

200 Multi-Service IronWare Security Configuration Guide53-1003035-02Extended IPv6 ACLs4Syntax: [no] [sequence num] permit | deny [ vlan vlan-id] icmp

Strany 134

Multi-Service IronWare Security Configuration Guide 20153-1003035-02Extended IPv6 ACLs4• port-unreachable• reassembly-timeout• renum-command• renum-re

Strany 135

4 Multi-Service IronWare Security Configuration Guide53-1003035-02Securing access methods1Secure Shell (SSH) accessFor more information on SSH, refer

Strany 136 - Displaying ACL definitions

202 Multi-Service IronWare Security Configuration Guide53-1003035-02Extended IPv6 ACLs4The tcp-udp-operator parameter can be one of the following:• eq

Strany 137 - • 1 – 99 for standard ACLs

Multi-Service IronWare Security Configuration Guide 20353-1003035-02Extended IPv6 ACLs4Syntax: regenerate-seq-num [num]The udp protocol indicates the

Strany 138 - VLAN Accounting

204 Multi-Service IronWare Security Configuration Guide53-1003035-02Extended IPv6 ACLs4Configuration considerations for Layer 2 IPv6 ACLsNOTEThis feat

Strany 139 - Modifying ACLs

Multi-Service IronWare Security Configuration Guide 20553-1003035-02Displaying IPv6 ACL definitions4NOTEThis example has accounting enabled, which is

Strany 140

206 Multi-Service IronWare Security Configuration Guide53-1003035-02CAM partitioning4ipv6 access-list rtr: 3 entries 10: permit ipv6 host 3000::2 any

Strany 141 - Adding or deleting a comment

Multi-Service IronWare Security Configuration Guide 20753-1003035-02Applying an IPv6 ACL4Brocade(config)# interface ethernet 3/1Brocade(config-if-e100

Strany 142

208 Multi-Service IronWare Security Configuration Guide53-1003035-02Applying an IPv6 ACL4When an IPv6 VRF is dynamically configured on an interface po

Strany 143 - Applying ACLs to interfaces

Multi-Service IronWare Security Configuration Guide 20953-1003035-02Adding a comment to an IPv6 ACL entry4Adding a comment to an IPv6 ACL entryYou can

Strany 144

210 Multi-Service IronWare Security Configuration Guide53-1003035-02Adding a comment to an IPv6 ACL entry4• Once the default remark gets associated wi

Strany 145

Multi-Service IronWare Security Configuration Guide 21153-1003035-02ACL CAM sharing for inbound IPv6 ACLs4The following example shows the comment text

Strany 146 - Enabling ACL conflict check

Multi-Service IronWare Security Configuration Guide 553-1003035-02Securing access methods1SNMP (Brocade Network Advisor) accessSNMP read or read-write

Strany 147 - Named ACLs

212 Multi-Service IronWare Security Configuration Guide53-1003035-02Filtering and priority manipulation based on 802.1p priority4• This feature cannot

Strany 148 - Layer-4 information in an ACL

Multi-Service IronWare Security Configuration Guide 21353-1003035-02ACL accounting4ACL accountingMulti-Service devices monitor the number of times an

Strany 149

214 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL accounting4• You can enable ACL accounting at the filter level by adding an en

Strany 150

Multi-Service IronWare Security Configuration Guide 21553-1003035-02ACL accounting4Displaying statistics for IPv6 ACL accountingTo display statistics

Strany 151

216 Multi-Service IronWare Security Configuration Guide53-1003035-02ACL accounting4Table 31 describes the output parameters of the show ipv6 access-li

Strany 152

Multi-Service IronWare Security Configuration Guide 21753-1003035-02IPv6 receive ACLs4IPv6 receive ACLsThis section discusses the following topics:•IP

Strany 153 - 802.1p priority

218 Multi-Service IronWare Security Configuration Guide53-1003035-02IPv6 receive ACLs4• After an upgrade to Multi-Service IronWare R05.6.00, the sub-p

Strany 154

Multi-Service IronWare Security Configuration Guide 21953-1003035-02IPv6 receive ACLs4NOTEYou must write this command to memory and perform a system r

Strany 155 - Numbered ACLs

220 Multi-Service IronWare Security Configuration Guide53-1003035-02IPv6 receive ACLs4NOTETable 32 shows the maximum supported IPv6 rACL entries for a

Strany 156

Multi-Service IronWare Security Configuration Guide 22153-1003035-02IPv6 receive ACLs4Brocade(config)# system-max ipv6-receive-cam 1024 Reload requir

Strany 157

6 Multi-Service IronWare Security Configuration Guide53-1003035-02Restricting remote access to management functions1Restricting remote access to manag

Strany 158 - IP broadcast ACL

222 Multi-Service IronWare Security Configuration Guide53-1003035-02IPv6 receive ACLs4Creating a policy-mapTo create a policy map “m1” to rate-limit t

Strany 159

Multi-Service IronWare Security Configuration Guide 22353-1003035-02IPv6 receive ACLs4Brocade(config)# show ipv6 access-list bindings!ipv6 receive acc

Strany 160

224 Multi-Service IronWare Security Configuration Guide53-1003035-02IPv6 receive ACLs4Brocade(config-ipv6-access-list b1)# permit ipv6 any anyBrocade(

Strany 161 - Field Description

Multi-Service IronWare Security Configuration Guide 22553-1003035-02IPv6 receive ACLs4SYSLOG: <14>Jun 6 10:38:14 FWD14 IPv6-rACL: Activated by

Strany 162 - IP broadcast ACL CAM

226 Multi-Service IronWare Security Configuration Guide53-1003035-02Commands4Syntax: clear ipv6 access-list receive ( all | name acl-name }The all par

Strany 163

Multi-Service IronWare Security Configuration Guide 22753-1003035-02clear ipv6 access-list receive4clear ipv6 access-list receiveClears IPv6 receive a

Strany 164 - IP receive ACLs

228 Multi-Service IronWare Security Configuration Guide53-1003035-02ipv6 receive access-list4ipv6 receive access-listConfigures an IPv6 access-control

Strany 165 - Configuring rACLs

Multi-Service IronWare Security Configuration Guide 22953-1003035-02ipv6 receive access-list4HistoryRelatedCommandsclear ipv6 access-list receiveipv6

Strany 166

230 Multi-Service IronWare Security Configuration Guide53-1003035-02ipv6 receive deactivate-acl-all4ipv6 receive deactivate-acl-allDeactivates the IPv

Strany 167

Multi-Service IronWare Security Configuration Guide 23153-1003035-02ipv6 receive delete-acl-all4ipv6 receive delete-acl-allDeletes IPv6 receive access

Strany 168

Multi-Service IronWare Security Configuration Guide 753-1003035-02Restricting remote access to management functions1Using an ACL to restrict Telnet ac

Strany 169

232 Multi-Service IronWare Security Configuration Guide53-1003035-02ipv6 receive rebind-acl-all4ipv6 receive rebind-acl-allRebinds an IPv6 receive acc

Strany 170 - 2 x 10G PPCR 1 1 - 2

Multi-Service IronWare Security Configuration Guide 23353-1003035-02show ipv6 access-list bindings4show ipv6 access-list bindingsDisplays all IPv6 acc

Strany 171 - ACL deny logging

234 Multi-Service IronWare Security Configuration Guide53-1003035-02show ipv6 access-list receive accounting4show ipv6 access-list receive accounting

Strany 172

Multi-Service IronWare Security Configuration Guide 23553-1003035-02show ipv6 access-list receive accounting4system-max ipv6-receive-cam

Strany 173 - • Enabling the Log Option

236 Multi-Service IronWare Security Configuration Guide53-1003035-02system-max ipv6-receive-cam4system-max ipv6-receive-camConfigures the number of IP

Strany 174 - Support for ACL CAM sharing

Multi-Service IronWare Security Configuration Guide 23753-1003035-02Chapter5Configuring Secure Shell and Secure CopyTable 33 displays the individual d

Strany 175

238 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5Secure Shell (SSH) server is a mechanism for allowing

Strany 176

Multi-Service IronWare Security Configuration Guide 23953-1003035-02SSH server version 2 support5• SSH server Protocol Assigned Numbers• SSH server Tr

Strany 177 - This field... Displays

240 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5• Data integrity is ensured with the hmac-sha1 algori

Strany 178

Multi-Service IronWare Security Configuration Guide 24153-1003035-02SSH server version 2 support5Syntax: show ip ssh configTable 34 shows the output i

Strany 179 - Commands

8 Multi-Service IronWare Security Configuration Guide53-1003035-02Restricting remote access to management functions1The ipv6-acl-name variable specifi

Strany 180 - Release Command History

242 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5TABLE 34 show ip ssh config command output informatio

Strany 181

Multi-Service IronWare Security Configuration Guide 24353-1003035-02SSH server version 2 support5The host DSA key pair is stored in the device’s syste

Strany 182

244 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5Enabling and disabling SSH server by generating and d

Strany 183

Multi-Service IronWare Security Configuration Guide 24553-1003035-02SSH server version 2 support5Deleting DSA and RSA key pairsTo delete DSA and RSA k

Strany 184

246 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5Collect one public key of each key type (DSA and/or R

Strany 185

Multi-Service IronWare Security Configuration Guide 24753-1003035-02SSH server version 2 support5Configuring DSA public key authenticationWith DSA pub

Strany 186

248 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5NOTEWhen one public-key file already exists, download

Strany 187 - Output field Description

Multi-Service IronWare Security Configuration Guide 24953-1003035-02SSH server version 2 support5Setting optional parametersYou can adjust the followi

Strany 188

250 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5The default is “yes”.Enabling empty password loginsBy

Strany 189

Multi-Service IronWare Security Configuration Guide 25153-1003035-02SSH server version 2 support5Designating an interface as the source for all SSH se

Strany 190

Multi-Service IronWare Security Configuration Guide 953-1003035-02Restricting remote access to management functions1Using ACLs to restrict SNMP access

Strany 191

252 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5Filtering SSH server access using ACLsYou can permit

Strany 192

Multi-Service IronWare Security Configuration Guide 25353-1003035-02SSH server version 2 support5Syntax: show ip ssh [| begin expression | exclude exp

Strany 193

254 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5The show who command also displays information about

Strany 194 - Configuring an IPv6 ACL

Multi-Service IronWare Security Configuration Guide 25553-1003035-02SSH server version 2 support5• Public Key authentication• Message Authentication C

Strany 195 - Example configurations

256 Multi-Service IronWare Security Configuration Guide53-1003035-02SSH server version 2 support5To delete the RSA host key pair, enter the following

Strany 196

Multi-Service IronWare Security Configuration Guide 25753-1003035-02SSH server version 2 support5To start an SSH2 client connection to an SSH2 server

Strany 197

258 Multi-Service IronWare Security Configuration Guide53-1003035-02Using Secure Copy5Using Secure CopySecure Copy (SCP) uses security built into SSH

Strany 198

Multi-Service IronWare Security Configuration Guide 25953-1003035-02Using Secure Copy5To copy and append a configuration file (c:\cfg\brocadehp.cfg) t

Strany 199 - ACL syntax

260 Multi-Service IronWare Security Configuration Guide53-1003035-02Using Secure Copy5Secure Copy Feature for Brocade NetIron XMRThe following encrypt

Strany 200 - TABLE 25 Syntax descriptions

Multi-Service IronWare Security Configuration Guide 26153-1003035-02Using Secure Copy5Syntax: scp file-name user@IP Address:Destination:file-name[:add

Strany 201

10 Multi-Service IronWare Security Configuration Guide53-1003035-02Restricting remote access to management functions1Possible values: 0 – 240 minutesD

Strany 202 - For ICMP

262 Multi-Service IronWare Security Configuration Guide53-1003035-02Using Secure Copy5• cspf-group• bypass-lsp For backward compatibility, the followi

Strany 203

Multi-Service IronWare Security Configuration Guide 26353-1003035-02Using Secure Copy5This command downloads image-file and replaces the mbridge image

Strany 204 - TABLE 26 Syntax descriptions

264 Multi-Service IronWare Security Configuration Guide53-1003035-02Using Secure Copy5To download and over-write the LP secondary image on one LP or a

Strany 205

Multi-Service IronWare Security Configuration Guide 26553-1003035-02Using Secure Copy5To download and over-write PBIF FPGA image, enter the following

Strany 206

266 Multi-Service IronWare Security Configuration Guide53-1003035-02Using Secure Copy5NOTEIf force-overwrite is present in the command, the command sk

Strany 207 - TABLE 27 Syntax descriptions

Multi-Service IronWare Security Configuration Guide 26753-1003035-02Using Secure Copy5Delete old file first optionNOTEThe delete file first option onl

Strany 208

268 Multi-Service IronWare Security Configuration Guide53-1003035-02Using Secure Copy5

Strany 209

Multi-Service IronWare Security Configuration Guide 26953-1003035-02Chapter6Configuring Multi-Device Port AuthenticationTable 37 displays the individu

Strany 210

270 Multi-Service IronWare Security Configuration Guide53-1003035-02How multi-device port authentication works6How multi-device port authentication wo

Strany 211

Multi-Service IronWare Security Configuration Guide 27153-1003035-02How multi-device port authentication works6Supported RADIUS attributesThe Brocade

Strany 212

Multi-Service IronWare Security Configuration Guide 1153-1003035-02Restricting remote access to management functions1Restricting Web management access

Strany 213

272 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring multi-device port authentication6Support for multi-device port authent

Strany 214 - Extended IPv6 ACLs

Multi-Service IronWare Security Configuration Guide 27353-1003035-02Configuring multi-device port authentication6Configuring an authentication method

Strany 215 - CER devices

274 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring multi-device port authentication6• Vendor-Specific Attributes (26) – R

Strany 216

Multi-Service IronWare Security Configuration Guide 27553-1003035-02Configuring multi-device port authentication6Brocade(config)# interface e 3/1Broca

Strany 217

276 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring multi-device port authentication6If a previous authentication attempt

Strany 218

Multi-Service IronWare Security Configuration Guide 27753-1003035-02Configuring multi-device port authentication6You can optionally specify an alterna

Strany 219

278 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring multi-device port authentication6Syntax: mac-authentication clear-mac-

Strany 220

Multi-Service IronWare Security Configuration Guide 27953-1003035-02Displaying multi-device port authentication information6To change the length of th

Strany 221

280 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying multi-device port authentication information6Displaying multi-device po

Strany 222

Multi-Service IronWare Security Configuration Guide 28153-1003035-02Displaying multi-device port authentication information6Syntax: show auth-mac-addr

Strany 223

Multi-Service IronWare Security Configuration Guide iii53-1003035-02ContentsAbout This DocumentIn this chapter . . . . . . . . . . . . . . . . . . . .

Strany 224 - Applying an IPv6 ACL

12 Multi-Service IronWare Security Configuration Guide53-1003035-02Restricting remote access to management functions1Specifying the maximum login atte

Strany 225 - Reapplying modified IPv6 ACLs

282 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying multi-device port authentication information6Syntax: show auth-mac-addr

Strany 226

Multi-Service IronWare Security Configuration Guide 28353-1003035-02Displaying multi-device port authentication information6Displaying the authenticat

Strany 227

284 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying multi-device port authentication information6

Strany 228

Multi-Service IronWare Security Configuration Guide 28553-1003035-02Chapter7Using the MAC Port Security FeatureTable 42 displays the individual Brocad

Strany 229

286 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring the MAC port security feature7The secure MAC addresses are not flushed

Strany 230

Multi-Service IronWare Security Configuration Guide 28753-1003035-02Configuring the MAC port security feature7Enabling the MAC port security featureBy

Strany 231

288 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring the MAC port security feature7To set the port security age timer to 10

Strany 232

Multi-Service IronWare Security Configuration Guide 28953-1003035-02Configuring the MAC port security feature7You can configure the delete-dynamic-lea

Strany 233

290 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring the MAC port security feature7Denying MAC addresses globally To deny a

Strany 234 - Clearing the ACL statistics

Multi-Service IronWare Security Configuration Guide 29153-1003035-02Configuring the MAC port security feature7In addition to the new processing of pac

Strany 235 - IPv6 receive ACLs

Multi-Service IronWare Security Configuration Guide 1353-1003035-02Restricting remote access to management functions1Restricting Web management access

Strany 236 - • Rule-based ACL

292 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying port security information7 Displaying port security information You can

Strany 237

Multi-Service IronWare Security Configuration Guide 29353-1003035-02Displaying port security information7Displaying the secure MAC addresses on the de

Strany 238

294 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying port security information7Brocade# show port security statistics 7Modul

Strany 239

Multi-Service IronWare Security Configuration Guide 29553-1003035-02Chapter8Configuring 802.1x Port Security Table 47 displays the individual devices

Strany 240

296 Multi-Service IronWare Security Configuration Guide53-1003035-02Overview of 802.1x port security8Overview of 802.1x port security The Multi-Servic

Strany 241

Multi-Service IronWare Security Configuration Guide 29753-1003035-02How 802.1x port security works8How 802.1x port security worksThis section explains

Strany 242

298 Multi-Service IronWare Security Configuration Guide53-1003035-02How 802.1x port security works8Authentication server – The device that validates t

Strany 243

Multi-Service IronWare Security Configuration Guide 29953-1003035-02How 802.1x port security works8Supplicant PAE – The Supplicant PAE supplies inform

Strany 244

300 Multi-Service IronWare Security Configuration Guide53-1003035-02How 802.1x port security works8By default, all controlled ports on the device are

Strany 245

Multi-Service IronWare Security Configuration Guide 30153-1003035-02How 802.1x port security works8If a client does not support 802.1x, authentication

Strany 246

14 Multi-Service IronWare Security Configuration Guide53-1003035-02Restricting remote access to management functions1Enabling Telnet accessTelnet acce

Strany 247

302 Multi-Service IronWare Security Configuration Guide53-1003035-02How 802.1x port security works8By default, traffic from clients that cannot be aut

Strany 248

Multi-Service IronWare Security Configuration Guide 30353-1003035-02802.1x port security and sFlow8• If a client has been denied access to the network

Strany 249

304 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring 802.1x port security8NOTE Multi-Device Port Authentication and 802.1x

Strany 250

Multi-Service IronWare Security Configuration Guide 30553-1003035-02Configuring 802.1x port security8Supported RADIUS attributesMany IEEE 802.1x Authe

Strany 251

306 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring 802.1x port security8• If the Tunnel-Type or the Tunnel-Medium-Type at

Strany 252

Multi-Service IronWare Security Configuration Guide 30753-1003035-02Configuring 802.1x port security8When strict security mode is enabled:• If the Fil

Strany 253

308 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring 802.1x port security8Dynamically applying existing ACLs or MAC address

Strany 254

Multi-Service IronWare Security Configuration Guide 30953-1003035-02Configuring 802.1x port security8• Multiple IP ACLs and MAC address filters can be

Strany 255

310 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring 802.1x port security8Enabling 802.1x port security By default, 802.1x

Strany 256 - SSH server version 2 support

Multi-Service IronWare Security Configuration Guide 31153-1003035-02Configuring 802.1x port security8When an interface’s control type is set to auto,

Strany 257 - Supported features

Multi-Service IronWare Security Configuration Guide 1553-1003035-02Restricting remote access to management functions1Syntax: [no] crypto-ssl certifica

Strany 258 - Configuring SSH server

312 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring 802.1x port security8The re-authentication interval is a global settin

Strany 259 - Syntax: show ip ssh config

Multi-Service IronWare Security Configuration Guide 31353-1003035-02Configuring 802.1x port security8Specifying the number of EAP-request or identity

Strany 260 - Generating a host key pair

314 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring 802.1x port security8Initializing 802.1x on a portTo initialize 802.1x

Strany 261 - Brocade# ssh show-host-keys

Multi-Service IronWare Security Configuration Guide 31553-1003035-02Displaying 802.1x information8Brocade(config-dot1x)# auth-fail-max-attempts 2Synta

Strany 262

316 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying 802.1x information8The following table describes the information displa

Strany 263

Multi-Service IronWare Security Configuration Guide 31753-1003035-02Displaying 802.1x information8To display information about the 802.1x configuratio

Strany 264 - Device Low High Average

318 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying 802.1x information8Displaying 802.1x statisticsTo display 802.1x statis

Strany 265

Multi-Service IronWare Security Configuration Guide 31953-1003035-02Displaying 802.1x information8Clearing 802.1x statisticsYou can clear the 802.1x s

Strany 266

320 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying 802.1x information8Displaying dynamically assigned VLAN informationThe

Strany 267 - Setting optional parameters

Multi-Service IronWare Security Configuration Guide 32153-1003035-02Displaying 802.1x information8Port 1/1 MAC Address Filter information: 802.1x dyn

Strany 268

16 Multi-Service IronWare Security Configuration Guide53-1003035-02Setting passwords1Setting passwordsPasswords can be used to secure the following ac

Strany 269

322 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying 802.1x information8Displaying information about the dot1x-mac-sessions

Strany 270 - Disabling 3-DES

Multi-Service IronWare Security Configuration Guide 32353-1003035-02Sample 802.1x configurations8Syntax: show dot1x mac-session brief [ | begin expres

Strany 271

324 Multi-Service IronWare Security Configuration Guide53-1003035-02Sample 802.1x configurations8The following commands configure the device in Figure

Strany 272 - Outbound SSHv2 client

Multi-Service IronWare Security Configuration Guide 32553-1003035-02Sample 802.1x configurations8Hub configuration Figure 8 illustrates a configuratio

Strany 273 - Enabling SSHv2 client

326 Multi-Service IronWare Security Configuration Guide53-1003035-02Sample 802.1x configurations8

Strany 274 - Using an SSH2 client

Multi-Service IronWare Security Configuration Guide 32753-1003035-02Chapter9Protecting against Denial of Service AttacksTable 54 displays the individu

Strany 275

328 Multi-Service IronWare Security Configuration Guide53-1003035-02Protecting against smurf attacks9The attacker sends an ICMP echo request packet to

Strany 276 - Using Secure Copy

Multi-Service IronWare Security Configuration Guide 32953-1003035-02Protecting against smurf attacks9The burst-max value can be from 1 – 100000.The lo

Strany 277 - • bypass-lsp

330 Multi-Service IronWare Security Configuration Guide53-1003035-02Protecting against TCP SYN attacks9Multicast Router Discovery messages:• Multicast

Strany 278 - Inbound commands:

Multi-Service IronWare Security Configuration Guide 33153-1003035-02Protecting against TCP SYN attacks9The number of incoming TCP SYN packets per seco

Strany 279

Multi-Service IronWare Security Configuration Guide 1753-1003035-02Setting passwords1Setting passwords for management privilege levelsYou can set one

Strany 280

332 Multi-Service IronWare Security Configuration Guide53-1003035-02Protecting against TCP SYN attacks9Protecting against a blind TCP reset attack usi

Strany 281

Multi-Service IronWare Security Configuration Guide 33353-1003035-02Protecting against TCP SYN attacks9The burst-max value can be from 1 – 100000.The

Strany 282

334 Multi-Service IronWare Security Configuration Guide53-1003035-02Displaying statistics from a DoS attack9Displaying statistics from a DoS attackYou

Strany 283

Multi-Service IronWare Security Configuration Guide 33553-1003035-02Chapter10Securing SNMP AccessTable 56 displays the individual Brocade devices and

Strany 284

336 Multi-Service IronWare Security Configuration Guide53-1003035-02Establishing SNMP community strings10• The default read-only community string is “

Strany 285

Multi-Service IronWare Security Configuration Guide 33753-1003035-02Using the User-Based Security model10Brocade(config)# snmp-s community myread ro v

Strany 286

338 Multi-Service IronWare Security Configuration Guide53-1003035-02Using the User-Based Security model10Configuring your NMSTo be able to use the SNM

Strany 287

Multi-Service IronWare Security Configuration Guide 33953-1003035-02Using the User-Based Security model10NOTESince the current implementation of SNMP

Strany 288 - RADIUS authentication

340 Multi-Service IronWare Security Configuration Guide53-1003035-02Using the User-Based Security model10The auth | noauth parameter determines whethe

Strany 289 - Supported RADIUS attributes

Multi-Service IronWare Security Configuration Guide 34153-1003035-02Using the User-Based Security model10NOTEThe SNMP group to which the user account

Strany 290

18 Multi-Service IronWare Security Configuration Guide53-1003035-02Setting passwords1Syntax: enable super-user-password textSyntax: enable port-config

Strany 291 - Setting RADIUS parameters

342 Multi-Service IronWare Security Configuration Guide53-1003035-02Using the User-Based Security model10The engine ID identifies the source or destin

Strany 292

Multi-Service IronWare Security Configuration Guide 34353-1003035-02Using the User-Based Security model10Interpreting varbinds in report packetsIf an

Strany 293 - Defining MAC address filters

344 Multi-Service IronWare Security Configuration Guide53-1003035-02Defining SNMP views10Defining SNMP viewsSNMP views are named groups of MIB objects

Strany 294

Multi-Service IronWare Security Configuration Guide 34553-1003035-02SNMP v3 configuration examples10SNMP v3 configuration examplesThe examples below s

Strany 295

346 Multi-Service IronWare Security Configuration Guide53-1003035-02SNMP v3 configuration examples10

Strany 296

Multi-Service IronWare Administration Configuration Guide 34753-1003035-02AppendixAACL Editing and Sequence NumbersThis appendix presents functional i

Strany 297

348 Multi-Service IronWare Administration Configuration Guide53-1003035-02Sequence NumbersApermit 1.1.1.1 0.0.0.0permit 2.2.2.2 0.0.0.0permit 3.3.3.3

Strany 298

Multi-Service IronWare Administration Configuration Guide 34953-1003035-02Creating an ACL filterAInternal and User Specified With the ACL editing feat

Strany 299

350 Multi-Service IronWare Administration Configuration Guide53-1003035-02Re-generating ACL sequence numbersABrocade(config)#show access-list name v4_

Strany 300 - MAC address or port

Multi-Service IronWare Administration Configuration Guide 35153-1003035-02Backward compatibility with earlier releasesABrocade(config)# show access-li

Strany 301

Multi-Service IronWare Security Configuration Guide 1953-1003035-02Setting passwords1• configure – CONFIG level; for example, Brocade(config)# • inter

Strany 302

352 Multi-Service IronWare Administration Configuration Guide53-1003035-02Backward compatibility with earlier releasesAExtended IP access list 191 : 4

Strany 303 - Overview

20 Multi-Service IronWare Security Configuration Guide53-1003035-02Setting up local user accounts1The enable password-display command enables display

Strany 304 - Local and global resources

Multi-Service IronWare Security Configuration Guide 2153-1003035-02Setting up local user accounts1If you configure local user accounts, you also need

Strany 305

iv Multi-Service IronWare Security Configuration Guide53-1003035-02Web interface login lockout . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 306

22 Multi-Service IronWare Security Configuration Guide53-1003035-02Enabling strict password enforcement1NOTEYou must be logged on with Super User acce

Strany 307

Multi-Service IronWare Security Configuration Guide 2353-1003035-02Enabling strict password enforcement1Strict password rulesNOTEIf enable strict-pass

Strany 308 - Configuring port security

24 Multi-Service IronWare Security Configuration Guide53-1003035-02Enabling strict password enforcement1Also, if the user tries to configure a passwor

Strany 309

Multi-Service IronWare Security Configuration Guide 2553-1003035-02Enabling strict password enforcement1Syntax: [no] enable strict-password-enforcemen

Strany 310

26 Multi-Service IronWare Security Configuration Guide53-1003035-02Web interface login lockout1Requirement to accept the message of the dayIf a messag

Strany 311

Multi-Service IronWare Security Configuration Guide 2753-1003035-02Configuring SSL security for the Web Management Interface1The first instance of the

Strany 312

28 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1Importing digital certificates and RSA priva

Strany 313

Multi-Service IronWare Security Configuration Guide 2953-1003035-02Configuring TACACS or TACACS+ security1• Web management access• Access to the Privi

Strany 314 - IETF RFC support

30 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1TACACS authenticationNOTEAlso, multiple chal

Strany 315

Multi-Service IronWare Security Configuration Guide 3153-1003035-02Configuring TACACS or TACACS+ security11. A user logs into the Brocade device using

Strany 316

Multi-Service IronWare Security Configuration Guide v53-1003035-02Configuring AAA authentication-method lists for login . . . . . . . . . . . . . . .

Strany 317

32 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1User action Applicable AAA operationsUser at

Strany 318

Multi-Service IronWare Security Configuration Guide 3353-1003035-02Configuring TACACS or TACACS+ security1AAA Security for commands pasted Into the ru

Strany 319

34 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security15. Optionally configure TACACS+ authorizatio

Strany 320

Multi-Service IronWare Security Configuration Guide 3553-1003035-02Configuring TACACS or TACACS+ security1NOTEIf you erase a tacacs-server command (by

Strany 321

36 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1• 0 = the key string is not encrypted and is

Strany 322

Multi-Service IronWare Security Configuration Guide 3753-1003035-02Configuring TACACS or TACACS+ security1NOTEEncryption of the TACACS+ keys is done b

Strany 323 - 802.1x ports

38 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1The commands above cause TACACS or TACACS+ t

Strany 324

Multi-Service IronWare Security Configuration Guide 3953-1003035-02Configuring TACACS or TACACS+ security1NOTEAfter successful key-authentication, the

Strany 325

40 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1• If the next method in the authentication m

Strany 326 - RADIUS server

Multi-Service IronWare Security Configuration Guide 4153-1003035-02Configuring TACACS or TACACS+ security1To set a user’s privilege level, you can con

Strany 327

vi Multi-Service IronWare Security Configuration Guide53-1003035-02Chapter 3 Access Control ListHow the Brocade device processes ACLs . . . . . . . .

Strany 328 - Setting the port control

42 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1Example user=bob { default service = permi

Strany 329 - Brocade(config)#dot1x-enable

Multi-Service IronWare Security Configuration Guide 4353-1003035-02Configuring TACACS or TACACS+ security1Configuring TACACS+ accountingThe Brocade de

Strany 330 - Setting the quiet period

44 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1Syntax: [no] aaa accounting system default s

Strany 331

Multi-Service IronWare Security Configuration Guide 4553-1003035-02Configuring TACACS or TACACS+ security1Displaying TACACS or TACACS+ statistics and

Strany 332 - Initializing 802.1x on a port

46 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1The show web command displays the privilege

Strany 333 - Displaying 802.1x information

Multi-Service IronWare Security Configuration Guide 4753-1003035-02Configuring TACACS or TACACS+ security1Following table lists all possible error con

Strany 334

48 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring TACACS or TACACS+ security1Validating TACACS+ accounting replyThe TACAC

Strany 335

Multi-Service IronWare Security Configuration Guide 4953-1003035-02Configuring RADIUS security1Configuring RADIUS securityYou can use a Remote Authent

Strany 336 - Displaying 802.1x statistics

50 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security11. A user triggers RADIUS authentication by doing one o

Strany 337 - Clearing 802.1x statistics

Multi-Service IronWare Security Configuration Guide 5153-1003035-02Configuring RADIUS security1Telnet - 08-25-2010 -- 11:20:18 This is the message o

Strany 338

Multi-Service IronWare Security Configuration Guide vii53-1003035-02IP broadcast ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 339

52 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1• A system event occurs, such as a reboot or reloading

Strany 340

Multi-Service IronWare Security Configuration Guide 5353-1003035-02Configuring RADIUS security1AAA security for commands pasted into the running confi

Strany 341 - Sample 802.1x configurations

54 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1• When a radius-server host is configured, a status-ser

Strany 342

Multi-Service IronWare Security Configuration Guide 5553-1003035-02Configuring RADIUS security1Configuring Brocade-specific attributes on the RADIUS s

Strany 343 - Hub configuration

56 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1foundry-access-list 5 string Specifies the access contr

Strany 344

Multi-Service IronWare Security Configuration Guide 5753-1003035-02Configuring RADIUS security1Enabling SNMP traps for RADIUS To enable SNMP traps for

Strany 345

58 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1The acct-port number parameter specifies what port to u

Strany 346

Multi-Service IronWare Security Configuration Guide 5953-1003035-02Configuring RADIUS security1Global radius configurationThe following global configu

Strany 347

60 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1Setting the RADIUS keyThe key parameter in the radius-s

Strany 348

Multi-Service IronWare Security Configuration Guide 6153-1003035-02Configuring RADIUS security1Within the authentication-method list, RADIUS is specif

Strany 349 - TCP security enhancement

viii Multi-Service IronWare Security Configuration Guide53-1003035-02Extended IPv6 ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 350

62 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1To configure the Brocade device to prompt only for a pa

Strany 351

Multi-Service IronWare Security Configuration Guide 6353-1003035-02Configuring RADIUS security1You enable RADIUS command authorization by specifying a

Strany 352 - Clear DoS attack statistics

64 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1Configuring RADIUS accountingThe Brocade devices suppor

Strany 353 - Securing SNMP Access

Multi-Service IronWare Security Configuration Guide 6553-1003035-02Configuring RADIUS security1Syntax: [no] aaa accounting system default start-stop r

Strany 354

66 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring RADIUS security1Configuring an IPv6 interface as the source for all RAD

Strany 355 - • Disclosure of information

Multi-Service IronWare Security Configuration Guide 6753-1003035-02Configuring AAA on the console1Syntax: show aaaThe following table describes the RA

Strany 356 - Defining the engine ID

68 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring AAA authentication-method lists for login13. Enter “exit” to display th

Strany 357 - Defining an SNMP group

Multi-Service IronWare Security Configuration Guide 6953-1003035-02Configuring authentication-method lists1The none option eliminates the requirement

Strany 358 - Defining an SNMP user account

70 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring authentication-method lists1NOTEIf a user cannot be authenticated using

Strany 359 - Displaying the engine ID

Multi-Service IronWare Security Configuration Guide 7153-1003035-02Configuring authentication-method lists1To configure an authentication-method list

Strany 360 - Displaying user information

Multi-Service IronWare Security Configuration Guide ix53-1003035-02Chapter 5 Configuring Secure Shell and Secure CopySSH server version 2 support . .

Strany 361

72 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuring authentication-method lists1tacacs Authenticate using the database on a

Strany 362 - Defining SNMP views

Multi-Service IronWare Security Configuration Guide 7353-1003035-02Chapter2Layer 2 Access Control ListsTable 13 displays the individual devices and th

Strany 363 - Simple SNMP v3 configuration

74 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuration rules and notes2Layer-2 Access Control Lists (ACLs) filter incoming t

Strany 364

Multi-Service IronWare Security Configuration Guide 7553-1003035-02Configuration rules and notes2• You can bind multiple rate limiting policies to a s

Strany 365 - Background

76 Multi-Service IronWare Security Configuration Guide53-1003035-02Configuration rules and notes2There can be up to 500 named L2 ACLs. The maximum len

Strany 366 - Sequence Numbers

Multi-Service IronWare Security Configuration Guide 7753-1003035-02Creating a numbered Layer-2 ACL table2Creating a numbered Layer-2 ACL tableYou crea

Strany 367 - Creating an ACL filter

78 Multi-Service IronWare Security Configuration Guide53-1003035-02Creating a numbered Layer-2 ACL table2In the above example, the first ACL entry wil

Strany 368

Multi-Service IronWare Security Configuration Guide 7953-1003035-02Creating a numbered Layer-2 ACL table2Deleting a numbered Layer-2 ACL entryYou can

Strany 369

80 Multi-Service IronWare Security Configuration Guide53-1003035-02Creating a numbered Layer-2 ACL table2The src-mac mask | any parameter specifies th

Strany 370

Multi-Service IronWare Security Configuration Guide 8153-1003035-02Creating a numbered Layer-2 ACL table2The priority option assigns outgoing traffic

Komentáře k této Příručce

Žádné komentáře