Brocade FastIron Ethernet Switch Security Configuration Gu Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Akcesoria komputerowe Brocade FastIron Ethernet Switch Security Configuration Gu. Brocade FastIron Ethernet Switch Security Configuration Guide User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 396
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów

Podsumowanie treści

Strona 1 - FastIron Ethernet Switch

53-1003088-0330 July 2014FastIron Ethernet SwitchSecurity Configuration GuideSupporting FastIron Software Release 08.0.10d

Strona 2

Web Authentication... 291Supported Web Authen

Strona 3 - Contents

Displaying SSH2 client information100 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 4

Rule-Based IP ACLs● Supported Rule-Based IP ACL Features... 101● ACL overview...

Strona 5

Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800FSX 1600ICX 7750Hardware-based ACLs 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.10ACL

Strona 6

Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800FSX 1600ICX 7750ACL logging of denied packets No No No No No No NoACL logging with traffic rate

Strona 7

listed in the Supported ACL features on inbound traffic and Supported ACL features on outboundtraffic tables respectively and discussed in more detail

Strona 8

combination in different ACLs. The total number of entries in all ACLs cannot exceed the systemmaximum listed in the following table.Maximum number of

Strona 9

How hardware-based ACLs workWhen you bind an ACL to inbound or outbound traffic on an interface, the device programs the Layer 4CAM with the ACL. Perm

Strona 10 - 53-1003088-03

• Inbound ACLs apply to all traffic, including management traffic. By default outbound ACLs are notapplied to traffic generated by the CPU. This must

Strona 11

Standard numbered ACL syntaxSyntax: [no] access-list ACL-num { deny | permit } { source-ip | hostnamewildcard } [ log ]orSyntax: [no] access-list ACL-

Strona 12

The log argument configures the device to generate Syslog entries and SNMP traps for inboundpackets that are denied by the access policy.The in | out

Strona 13 - Document conventions

Dynamic ARP inspection configuration... 334Displaying ARP inspection status and ports...

Strona 14 - Notes, cautions, and warnings

Syntax: [no] ip access-list standard {ACL-name |ACL-num } { deny | permit } { source-ip |hostname } [ log ]Syntax: [no] ip access-list standard {ACL-n

Strona 15 - Getting technical help

NOTEIf you use the CIDR format, the ACL entries appear in this format in the running-config and startup-config files, but are shown with subnet mask i

Strona 16 - Document feedback

Extended numbered ACL configurationThis section describes how to configure extended numbered ACLs.Extended ACLs let you permit or deny packets based o

Strona 17 - About This Document

If you prefer to specify the wildcard (mask value) in Classless Interdomain Routing (CIDR) format, youcan enter a forward slash after the IP address,

Strona 18

The tcp/udp comparison operator parameter specifies a comparison operator for the TCP or UDP portnumber. This parameter applies only when you specify

Strona 19 - Security Access

• network or 7 - The ACL matches packets that have the network control precedence. If you specifythe option number instead of the name, specify number

Strona 20 - Securing access methods

The dscp-matching option matches on the packet’s DSCP value. Enter a value from 0 - 63. Thisoption does not change the packet’s forwarding priority th

Strona 21

The second entry denies IGMP traffic from the host device named "rkwong" to the 10.157.21.x network.The third entry denies IGMP traffic from

Strona 22

Extended named ACL configurationThe commands for configuring named ACL entries are different from the commands for configuringnumbered ACL entries. Th

Strona 23

The wildcard parameter specifies the portion of the source IP host address to match against. Thewildcard is in dotted-decimal notation (IP address for

Strona 24

Example: Configuring IPv6 RA guard on a device...364Example: Configuring IPv6 RA guard in a network...364

Strona 25 - Remote access restrictions

NOTEThe QoS options listed below are only available if a specific ICMP type is specified for the icmp-typeparameter and cannot be used with the any-ic

Strona 26 - Restricting Telnet connection

• flash-override or 4 - The ACL matches packets that have the flash override precedence. If youspecify the option number instead of the name, specify

Strona 27 - Defining the Telnet idle time

NOTEThe dscp-cos-mapping option is supported on FSX devices only.The dscp-marking option enables you to configure an ACL that marks matching packets w

Strona 28

To enable this feature, enter the ip preserve-ACL-user-input-format command.device(config)#ip preserve-ACL-user-input-formatSyntax: ip preserve-ACL-us

Strona 29

Syntax: [no] ip access-list [ standard | extended ] ACL-numSyntax:remark comment-textFor ACL-num , enter the number of the ACL.The comment-text can be

Strona 30 - Device management security

The following shows the comment text for a numbered ACL, ACL 100, in a show running-configdisplay.device#show running-config...access-list 100 remark

Strona 31 - Disabling TFTP access

ACL loggingBrocade devices support ACL logging of inbound packets that are sent to the CPU for processing(denied packets).NOTEACL logging is not suppo

Strona 32 - Setting a Telnet password

NOTEThe above limitation applies only to IPv4 ACLs, it does not apply to the use of ACLs to log IPv6 traffic.• When ACL logging is enabled on Brocade

Strona 33

The above commands create ACL entries that include the log option, then bind the ACL to interface e9/12. Statistics for packets that match the deny st

Strona 34

or applies the interface's ACL entries to the packet and permits or denies the packet according to thefirst matching ACL.• For other fragments of

Strona 35 - Local user accounts

Preface● Document conventions...13● Brocade resources

Strona 36

device(config-vlan-101)#router-interface ve 101device(config-vlan-101)#exitdevice(config)#enable ACL-per-port-per-vlandevice(config)#ip access-list ex

Strona 37

202, 203, and 204, but not 300, 401, 600, and 900. See the release notes for a list of supportedmodules.• Brocade devices do not support a globally-co

Strona 38 - Configuring password history

Applying an IPv4 ACL to a subset of ports on a virtual interface (Layer 3devices only)NOTEThis section applies to IPv4 ACLs only. IPv6 ACLs do not sup

Strona 39 - Setting passwords to expire

address. This behavior can cause a condition called "ARP hijacking", when two hosts with the same IPaddress try to send an ARP request to th

Strona 40

The access-list-number parameter identifies the ID of the standard ACL that will be used to filter thepacket. Only the source and destination IP addre

Strona 41

precedence 6device(config)#access-list 103 permit ip any any The first entry in this ACL denies TCP traffic from the 10.157.21.x network to the 10.157

Strona 42 - TACACS and TACACS+ security

• dscp-marking - Marks the DSCP value in the outgoing packet with the value you specify.• internal-priority-marking and 802.1p-priority-marking - Supp

Strona 43

The dscp-cos-mapping option maps the DSCP value in incoming packets to a hardware table thatprovides mapping of each of the 0 - 63 DSCP values, and di

Strona 44 - TACACS authentication

provide DSCP-marking and DSCP-matching information in order to assign 802.1p priority values,which required the deployment of a 64-line ACL to match a

Strona 45 - TACACS+ accounting

Syntax: access-list num (100-199) permit tcp any any 802.1p-priority-marking priority value (0-7) [internal-priority-marking value (0-7) ]For UDPdevic

Strona 46

Convention Descriptionvalue In Fibre Channel products, a fixed value provided as input to a commandoption is printed in plain text, for example, --sho

Strona 47 - Configuring TACACS+

DSCP matchingThe dscp-matching option matches on the packet DSCP value. This option does not change thepacket forwarding priority through the device o

Strona 48 - Enabling TACACS

ACL accountingACL accounting helps to collect usage information for access lists configured on the device. Counters,stored in hardware, keep track of

Strona 49 - Setting the TACACS+ key

------------------------------------------------- 65533: Implicit ND_NA Rule: permit any any Hit Count: (1Min) 0 (5Sec)

Strona 50 - Setting the timeout parameter

by the show access-list access-list-id command to determine the hardware usage for an ACL. Togain more hardware resources, you can modify the ACL rule

Strona 51

use: 3)permit udp host 192.168.2.169 any (Flows: N/A, Packets: N/A, Rule cam use: 1)permit icmp any any (Flows: N/A, Packets: N/A, Rule cam use: 1)den

Strona 52

• You cannot apply PBR on a port if that port already has ingress ACLs, ACL-based rate limiting,DSCP-based QoS, MAC address filtering.• The number of

Strona 53

NOTEDo not use an access group to apply the ACL to an interface. Instead, use a route map to apply theACL globally or to individual interfaces for PBR

Strona 54

NOTEIf you use the CIDR format, the ACL entries appear in this format in the running-config and startup-config files, but are shown with subnet mask i

Strona 55

The map-name variable is a string of characters that names the map. Map names can be up to 32characters in length. You can define an unlimited number

Strona 56

Syntax: ip policy route-map map-nameEnter the name of the route map you want to use for the route-map map-name parameter.Configuration examples for po

Strona 57

Brocade resourcesVisit the Brocade website to locate related documentation for your product and additional Brocaderesources.You can download additiona

Strona 58 - RADIUS security

device(config-routemap test-route)#set ip next-hop 192.168.2.1device(config-routemap test-route)#exitThe following commands configure the second entry

Strona 59 - AAA operations for RADIUS

Trunk formation with PBR policyPBR can be applied on trunk primary port ,only if the port is untagged. When a trunk is formed, the PBRpolicy on the pr

Strona 60

Trunk formation with PBR policy152 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 61 - Configuring RADIUS

IPv6 ACLs● Supported IPv6 ACL features... 153● IPv6 ACL overview..

Strona 62

with 4000 entries, two ACLs with 2000 and 2093 entries respectively (combining IPv4 and IPv6 ACLs),etc.An IPv6 ACL is composed of one or more conditio

Strona 63

• Authentication Header (AHP)• Encapsulating Security Payload (ESP)• Internet Control Message Protocol (ICMP)• Internet Protocol Version 6 (IPv6)• Str

Strona 64 - RADIUS server per port

To disable IPv6, first remove the ACL from the interface.• For notes on applying IPv6 ACLs to trunk ports, see Applying an IPv6 ACL to a trunk group o

Strona 65

device(config-if-4/3)# ipv6 traffic-filter netw indevice(config)# write memoryHere is another example.device(config)# ipv6 access-list nextonedevice(c

Strona 66 - RADIUS parameters

• permit icmp any any nd-na - Allows ICMP neighbor discovery acknowledgements.• permit icmp any any nd-ns - Allows ICMP neighbor discovery solicitatio

Strona 67 - Setting RADIUS over IPv6

Syntax for creating an IPv6 ACLNOTEThe following features are not supported:• ipv6-operator flow-label• ipv6-operator fragments when any protocol is s

Strona 68

Document feedbackTo send feedback and report errors in the documentation you can use the feedback form posted withthe document or you can e-mail the d

Strona 69 - RADIUS authorization

[ 802.1p-priority-matching number ][ dscp-marking number 802.1p-priority-markingnumber internal-priority-marking number ][dscp-marking dscp-value dscp

Strona 70

Syntax descriptions (Continued)TABLE 13 IPv6 ACLargumentsDescriptionipv6-source-prefix/prefix-lengthThe ipv6-source-prefix/prefix-length parameter s

Strona 71

Syntax descriptions (Continued)TABLE 13 IPv6 ACLargumentsDescriptiontcp-udp-operator The tcp-udp-operator parameter can be one of the following:• eq

Strona 72

Syntax descriptions (Continued)TABLE 13 IPv6 ACLargumentsDescription802.1p-priority-marking numberUse the 802.1p-priority-markingnumber parameter to

Strona 73 - SSL security

• nd-ns• next-header• no-admin• no-route• packet-too-big• parameter-option• parameter-problem• port-unreachable• reassembly-timeout• renum-command• re

Strona 74

• Gbps Ethernet ports• 10 Gbps Ethernet ports• Trunk groups• Virtual routing interfacesTo apply an IPv6 ACL to an interface, enter commands such as th

Strona 75 - Authentication-method lists

You can add a comment by entering the remark command immediately preceding an ACL entry, Forexample, to enter comments preceding an ACL entry, enter c

Strona 76

Configuring IPv6 ACL accountingSteps to enable, display, and clear IPv6 ACL accounting1. To enable IPv6 ACL accounting, use the enable-accounting comm

Strona 77

Displaying IPv6 ACLsTo display the IPv6 ACLs configured on a device, enter the show ipv6 access-list command. Here isan example.device#show ipv6 acces

Strona 78

802.1X Port Security● Supported 802.1X port security features...169● IETF RFC supp

Strona 79

About This Document● What’s new in this document ... 17● How com

Strona 80

IETF RFC supportBrocade FastIron devices support the IEEE 802.1X standard for authenticating devices attached toLAN ports. Using 802.1X port security,

Strona 81 - SSH2 and SCP

FIGURE 1 Authenticator, client/supplicant, and authentication server in an 802.1X configurationAuthenticator - The device that controls access to the

Strona 82 - SSH2 supported features

Communication between the devicesFor communication between the devices, 802.1X port security uses the Extensible AuthenticationProtocol (EAP), defined

Strona 83 - SSH2 authentication types

FIGURE 3 Controlled and uncontrolled ports before and after client authenticationBefore a Client is authenticated, only the uncontrolled port on the A

Strona 84

FIGURE 4 Message exchange between client/supplicant, authenticator, and authentication serverIn this example, the Authenticator (the FastIron switch)

Strona 85

authentication server to protect messages from unauthorized users’ eavesdropping activities. SinceEAP-TLS requires PKI digital certificates on both th

Strona 86

NOTEIP MTU cannot be configured globally.EAP pass-through supportEAP pass-through is supported on FastIron devices that have 802.1X enabled. EAP pass-

Strona 87

FIGURE 5 Multiple hosts connected to a single 802.1X-enabled portIf there are multiple hosts connected to a single 802.1X-enabled port, the Brocade de

Strona 88 - Optional SSH parameters

1. One of the 802.1X-enabled Clients attempts to log into a network in which a Brocade device servesas an Authenticator.2. The Brocade device creates

Strona 89 - Setting the SSH port number

‐ Configurable hardware aging period for denied client dot1x-mac-sessions. Refer to Configurable hardware aging period for denied client dot1x-mac-ses

Strona 90 - Displaying SSH information

How command information is presented in this guide18 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 91

period ends, the denied Client's dot1x-mac-session ages out, and the Client can be authenticatedagain.802.1X port security and sFlowsFlow is a st

Strona 92

‐ Dynamic VLAN assignment for 802.1X port configuration on page 184 (optional)‐ Dynamically applying IP ACLs and MAC address filtersto 802.1X ports on

Strona 93 - Secure copy with SSH2

The dot1x parameter indicates that this RADIUS server supports the 802.1X standard. A RADIUSserver that supports the 802.1X standard can also be used

Strona 94

Permit user access to the network after a RADIUS timeoutTo set the RADIUS timeout behavior to bypass 802.1X authentication and permit user access to t

Strona 95

NOTEThe commands auth-fail-action restrict-vlan and auth-fail-vlanid are supported in the global dot1xmode and are not supported at the port-level. Th

Strona 96 - SSH2 client

• When the Brocade device receives the value specified for the Tunnel-Private-Group-ID attribute, itchecks whether the vlan-name string matches the na

Strona 97 - Enabling SSH2 client

In this example, the port is added to VLANs 12 and 20 or VLANs 12 and the VLAN named"marketing". When a tagged packet is authenticated, and

Strona 98 - Using SSH2 client

• If the port is not already a member of a RADIUS-specified VLAN, and the RADIUS Access-Acceptmessage specifies the name or ID of a valid VLAN on the

Strona 99

• Concurrent operation of MAC address filters and IP ACLs is not supported.• A dynamic IP ACL will take precedence over an IP ACL that is bound to a p

Strona 100

Syntax: [no] global-filter-strict-securityTo disable strict security mode for a specific interface, enter commands such as the following.device(config

Strona 101 - Rule-Based IP ACLs

Security Access● Supported security access features... 19● Securing acces

Strona 102

Notes for dynamically applying ACLs or MAC address filters• The name in the Filter ID attribute is case-sensitive.• You can specify only numbered MAC

Strona 103 - ACL overview

Enabling 802.1X port securityBy default, 802.1X port security is disabled on Brocade devices. To enable the feature on the deviceand enter the dot1x c

Strona 104 - ACL IDs and entries

When an interface control type is set to auto, the controlled port is initially set to unauthorized, but ischanged to authorized when the connecting C

Strona 105 - Default ACL action

For example, to re-authenticate Clients connected to interface 3/1, enter the following command.device#dot1x re-authenticate e 3/1Syntax: dot1x re-aut

Strona 106 - How hardware-based ACLs work

You can optionally change the number of times the Brocade device should retransmit the EAP-request/identity frame. You can specify between 1 - 10 fram

Strona 107

Specifying a timeout for retransmission of messages to theauthentication serverWhen performing authentication, the Brocade device receives EAPOL frame

Strona 108 - Standard numbered ACL syntax

You can configure the authentication-failure action using one of the following methods:• Configure the same authentication-failure action for all port

Strona 109 - Standard named ACL syntax

Disabling aging for dot1x-mac-sessionsThe dot1x-mac-sessions for Clients authenticated or denied by a RADIUS server are aged out if notraffic is recei

Strona 110

You can specify from 1 - 65535 seconds. The default is 120 seconds.Moving native VLAN mac-sessions to restrict VLANYou can move the native VLAN mac-se

Strona 111

This feature is disabled by default. To enable this feature and change the timeout period, entercommands such as the following.device(config)#dot1x-en

Strona 112 - Extended numbered ACL syntax

© 2014, Brocade Communications Systems, Inc. All Rights Reserved.Brocade, the B-wing symbol, Brocade Assurance, ADX, AnyIO, DCX, Fabric OS, FastIron,

Strona 113

NOTEWeb management is not supported in Release 8.0.00a and later releases. If web management isenabled, you must configure the no web-management comma

Strona 114

802.1X accounting attributes for RADIUS (Continued)TABLE 14 Attribute name Attribute ID Data Type DescriptionAcct-Status-Type 40 integer Indicates w

Strona 115

Displaying 802.1X configuration informationTo display information about the 802.1X configuration on the Brocade device, enter the show dot1xcommand.de

Strona 116

Output from the show dot1x command (Continued)TABLE 15 Field Descriptionservertimeout When the Authentication Server does not respond to a message s

Strona 117

Output from the show dot1x configuration command. (Continued)TABLE 16 Field DescriptionAuthentication-fail-action The configured authentication-fail

Strona 118 - Extended named ACL syntax

Original PVID : 1Authorized PVID ref count : 2Restricted PVID ref count : 0Radius assign PVID ref count : 0num mac sessio

Strona 119

Output from the show dot1x config command for an interface (Continued)TABLE 17 Field Descriptionnum mac authorized The number of authorized dot1x-ma

Strona 120

Output from the show dot1x statistics command (Continued)TABLE 18 Field StatisticsLast EAPOL Source The source MAC address in the last EAPOL frame r

Strona 121

In this example, the 802.1X-enabled port has been moved from VLAN 1 to VLAN 2. When the clientdisconnects, the port will be moved back to VLAN 1.The s

Strona 122

Syntax: show dot1x mac-address-filter [ all | ethernet port ]The all keyword displays all dynamically applied MAC address filters active on the device

Strona 123 - ACL comment text management

Syntax: show dot1x config ethernet portDisplaying 802.1X multiple-host authentication informationYou can display the following information about 802.1

Strona 124 - Viewing comments in an ACL

Ways to secure management access to Brocade devices (Continued)TABLE 2 Access method How the access method issecured by defaultWays to secure theacc

Strona 125

Output from the show dot1x mac-session command (Continued)TABLE 19 Field DescriptionPAE State The current status of the Authenticator PAE state mach

Strona 126 - ACL logging

Point-to-point configurationThe following figure illustrates a sample 802.1X configuration with Clients connected to three ports onthe Brocade device.

Strona 127

default key mirabeau dot1xdevice(config)#dot1x-enable e 1 to 3device(config-dot1x)#re-authenticationdevice(config-dot1x)#timeout re-authperiod 2000dev

Strona 128 - Displaying ACL Log Entries

FIGURE 7 Sample 802.1X configuration using a hubSample 802.1x configuration using a hubThe following commands configure the Brocade device in the Samp

Strona 129

device(config-if-e1000-1)#dot1x port-control autodevice(config-if-e1000-1)#exit802.1X Authentication with dynamic VLAN assignmentThe following figure

Strona 130

2 is authenticated first, then the PVID for port e2 is changed to VLAN 20. Since a PVID cannot bechanged by RADIUS authentication after it has been dy

Strona 131

Multi-device port authentication and 802.1Xsecurity on the same port216 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 132 - ACLs to filter ARP packets

MAC Port Security● Supported MAC port security features... 217● MAC port securi

Strona 133

if the interface then receives a packet with a source MAC address that does not match the learnedaddresses, it is considered a security violation.When

Strona 134 - Clearing the filter count

Secure MAC movementIf you move a connected device that has MAC address configured as secure on one port to anotherport, the FastIron device connects t

Strona 135 - QoS options for IP ACLs

Ways to secure management access to Brocade devices (Continued)TABLE 2 Access method How the access method issecured by defaultWays to secure theacc

Strona 136

For example, to configure interface 7/11 to have a maximum of 10 secure MAC addresses, enter thefollowing commands.device(config)#interface ethernet 7

Strona 137

On the ICX 7750 device, the port security age can only be set to the global hardware age. The absoluteage and no age secure MACs are configured as sta

Strona 138

For example, to automatically save learned secure MAC addresses every 20 minutes, enter thefollowing commands.device(config)#port securitydevice(confi

Strona 139

Aging for restricted MAC addresses is done in software. There can be a worst case inaccuracy of oneminute from the specified time.The restricted MAC a

Strona 140 - ACL statistics

Displaying port security informationYou can display the following information about the MAC port security feature:• The port security settings for an

Strona 141 - ACL accounting

Output from the show port security mac command TABLE 22 Field DescriptionPort The slot and port number of the interface.Num-Addr The number of MAC a

Strona 142

For example, to display port security statistics for interface module 7, enter the show port securitystatistics command.device#show port security stat

Strona 143 - Displaying ACL information

MAC-based VLANs● Supported MAC-based VLAN features... 227● MAC-based VLAN overvi

Strona 144 - Policy-based routing (PBR)

from the new MAC address will be blocked or dropped until the authentication succeeds. Traffic isdropped if the authentication fails.Static and dynami

Strona 145 - Configuring the ACLs

NOTEEven though the feature supports up tp a maximum of 32 MAC address per physical port, theconfiguration of the maximum number of MAC addresses per

Strona 146

Remote access to management function restrictionsYou can restrict access to management functions from remote sources, including Telnet and SNMP.The fo

Strona 147 - Configuring the route map

CLI commands for MAC-based VLANs TABLE 25 CLI command Description CLI levelmac-auth mac-vlan enable Enables per-port MAC-based VLAN Interfacemac-aut

Strona 148 - Enabling PBR

vlan 222 name RESTRICTED_MBV by portuntagged ethe 0/1/4mac-vlan-permit ethe 0/1/1 to 0/1/3vlan 666 name RESTRICTED_MAC_AUTH by portuntagged ethe 0/1/2

Strona 149 - Setting the next hop

NOTEMAC-based VLAN is not supported on trunk or LACP ports. Do not configure trunks on MAC-basedVLAN-enabled ports.Using MAC-based VLANs and 802.1X se

Strona 150

Brocade vendor-specific attributes for RADIUS TABLE 27 Attribute name Attribute ID Data type OptionalormandatoryDescriptionFoundry-MAC-basedVLAN-QoS

Strona 151

For blocked hostsFor blocked hosts, as long as the Brocade device is receiving traffic, aging does not occur. In theoutput of the show table-mac-vlan

Strona 152

Enter the command at the global or interface configuration level.The denied-mac-only parameter prevents denied sessions from being aged out, but ages

Strona 153 - IPv6 ACLs

4. To enable MAC-based VLAN on the port.device(config)#interface e 0/1/1device(config-if-e1000-0/1/1)#mac-authentication mac-vlan enable5. To disable

Strona 154

NOTEIf static Mac-Based VLAN is configured on a port, the port will be added only to the VLAN table forwhich the static MAC-based VLAN configuration e

Strona 155 - IPv6 ACL configuration notes

Field DescriptionStatic Macs The number of currently connected active static hosts.Static Conf The number of static hosts that are configured on the p

Strona 156 - Configuring an IPv6 ACL

-------------------------------------------------------------------------------MAC Address Port Vlan Authenticated Time Age dot1x------

Strona 157

To configure a more restrictive ACL, create permit entries and omit the permit any entry at the end ofthe ACL.device(config)#access-list 10 permit hos

Strona 158 - Creating an IPv6 ACL

Field DescriptionAuthenticated No indicates that authentication has failed.Inp indicates that authentication is in progress.Time The time at which aut

Strona 159 - For ICMP

Displaying MAC-VLAN information for a specific interfaceEnter the show table-mac-vlan e command to display MAC-VLAN information for a specific interfa

Strona 160

Field DescriptionPri This field indicates the value set for Foundry-MAC-based VLAN-QoS attribute in the RADIUSconfiguration for dynamic hosts, if conf

Strona 161

0d18h46m28s:I:running-config was changed from console0d02h12m25s:A:MAC Based Vlan Mapping failed for [0000.0011.0108 ] on port 0/2/1(Invalid User)0d02

Strona 162

FIGURE 9 Sample MAC-based VLAN configurationHost A MAC address is statically mapped to VLAN 1 with priority 1 and is not subjected to RADIUSauthentica

Strona 163 - ICMP message configurations

radius-server host 10.44.3.111radius-server key 1 $-ndUnomac-authentication enablemac-authentication max-age 60mac-authentication hw-deny-age 30mac-au

Strona 164

Sample MAC-based VLAN application246 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 165

Defining MAC Address Filters● Supported MAC address filter features... 247● MAC

Strona 166 - Support for ACL logging

MAC address filters command syntaxTo configure and apply a MAC address filter, enter commands such as the following.device(config)# mac filter 1 deny

Strona 167

NOTEYou cannot add or remove individual filters in the group. To add or remove a filter on an interface, applythe filter group again containing all th

Strona 168 - Displaying IPv6 ACLs

The ro parameter indicates that the community string is for read-only ("get") access. The rw parameterindicates the community string is for

Strona 169 - 802.1X Port Security

MAC address filter logging command syntaxTo configure MAC address filter logging globally, enter the following CLI commands at the globalCONFIG level.

Strona 170 - IETF RFC support

MAC address filter override for 802.1X-enabled portsThe MAC address filtering feature on an 802.1X-enabled port allows 802.1X and non-802.1X devices t

Strona 171

The filter-num command identifies the MAC address filter. The maximum number of supported MACaddress filters is determined by the mac-filter-sys defau

Strona 172

Multi-Device Port Authentication● Supported Multi-device port authentication (MDPA) features... 253● How multi-dev

Strona 173

Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800FSX 1600ICX 7750Multi-Device Port Authentication 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.0

Strona 174

the device to move the port on which the non-authenticated MAC address was learned into a restrictedor "guest" VLAN, which may have limited

Strona 175 - Setting the IP MTU size

• Vendor-Specific (26) - RFC 2865• Session-Timeout (27) - RFC 2865• Termination-Action (29) - RFC 2865• Calling-Station-ID (31) - RFC 2865• NAS-Identi

Strona 176 - EAP pass-through support

Support for DHCP snooping with dynamic ACLsNOTEThis feature is not supported on FCX devices.Multi-device port authentication and DHCP snooping are sup

Strona 177

If multi-device port authentication fails for a device, then by default traffic from the device is eitherblocked in hardware, or the device is placed

Strona 178

Multi-device port authentication configurationConfiguring multi-device port authentication on the Brocade device consists of the following tasks:• Ena

Strona 179

Restricting Telnet access to a specific IP addressTo allow Telnet access to the Brocade device only to the host with IP address 10.157.22.39, enter th

Strona 180 - 802.1X accounting

device(config)#int e 3/1 to 3/12device(config-mif-3/1-3/12)#mac-authentication enableSpecifying the format of the MAC addresses sent to theRADIUS serv

Strona 181 - Setting RADIUS parameters

Syntax: [no] mac-authentication auth-fail-action block-trafficDropping traffic from non-authenticated MAC addresses is the default behavior when multi

Strona 182 - Supported RADIUS attributes

To enable dynamic VLAN assignment for authenticated MAC addresses, you must add attributes tothe profile for the MAC address on the RADIUS server, the

Strona 183 - Re-authenticate a user

Configuring the RADIUS server to support dynamic VLAN assignmentTo specify VLAN identifiers on the RADIUS server, add the following attributes to the

Strona 184

• Enabling dynamic VLAN support for tagged packets on non-member VLAN ports is not supportedon FWS and FCX devices.• The mac-authentication disable-in

Strona 185 - Specifying a tagged VLAN

displayed, although they can be displayed with the show vlan , show auth-mac-addresses detail ,and show auth-mac-addresses authorized-mac commands.You

Strona 186

Support is automatically enabled when all of the required conditions are met.The following describes the conditions and feature limitations:• On Layer

Strona 187

configure the Filter-ID (type 11) attribute on the RADIUS server. The Filter-ID attribute specifies thename or number of the Brocade IP ACL.The follow

Strona 188 - Disabled strict security mode

To specify a maximum rate for RADIUS authentication attempts, enter commands such as thefollowing.device(config)#interface e 3/1device(config-if-e1000

Strona 189

NOTESource guard protection is supported only on the router image and not on the switch image.Viewing the assigned ACL for ports on which source guard

Strona 190

The following command allows Telnet access to the Brocade device to a host with any IP address andMAC address 0000.000f.e9a0.device(config)#telnet cli

Strona 191 - Setting the port control

Disabling aging for authenticated MAC addressesMAC addresses that have been authenticated or denied by a RADIUS server are aged out if no trafficis re

Strona 192

configurable through the CLI, with the mac-authentication max-age command. Once the hardwareaging period ends, the software aging period begins. When

Strona 193 - Setting the quiet period

process and blocks user access to the network, unless restrict-vlan is configured, in which case, theuser is placed into a VLAN with restricted or lim

Strona 194

the request sent to the RADIUS server. For example, given a MAC address of 0000000feaa1, the usersfile on the RADIUS server would be configured with a

Strona 195 - Initializing 802.1X on a port

1/22 100 0 0 04/5 30 0 0 0Syntax: show auth-mac-addressT

Strona 196

Output from theshow authenticated-mac-address configuration command (Continued)TABLE 30 Field DescriptionDyn-vlan Whether RADIUS dynamic VLAN assign

Strona 197

Output from the show authenticated-mac-address address command (Continued)TABLE 31 Field DescriptionCAM Index If the MAC address is blocked, this is

Strona 198

0000.0000.0321 18/1 87 No 00d01h03m17s H52 Ena0000.0000.0259 18/1 87 No 00d01h03m17s H52 Ena0000.0000.0065 18/1 87 Yes

Strona 199

Authentication attempts : 0 RADIUS timeouts : 0 RADIUS timeouts action : Success MAC Address on PVID

Strona 200 - Displaying 802.1X information

Output from the show auth-mac-addresses detailed command (Continued)TABLE 33 Field DescriptionAccepted Mac Addresses The number of MAC addresses tha

Strona 201 - Syntax: show dot1x

NOTEYou need to configure telnet with the enable telnet authentication local command to enable only acertain number of telnet login attempts.Changing

Strona 202

Output from the show auth-mac-addresses detailed command (Continued)TABLE 33 Field DescriptionRADIUS Server The IP address of the RADIUS server used

Strona 203

To display the table of allowed mac addresses enter the show table denied-mac command as shown.Syntax: show table mac addressThe mac address variable

Strona 204

FIGURE 10 Using multi-device port authentication with dynamic VLAN assignmentIn this example, multi-device port authentication is performed for both d

Strona 205 - Displaying 802.1X statistics

mac-authentication auth-fail-action restrict-vlan mac-authentication enable-dynamic-vlan mac-authentication disable-ingress-filteringThe mac-authenti

Strona 206 - Clearing 802.1X statistics

FIGURE 11 Using multi-device port authentication with dynamic VLAN assignmentIn this example, multi-device port authentication is performed for both d

Strona 207

VLAN, authentication would not occur. In this case, port e1 must be added to that VLAN prior toauthentication.The part of the running-config related t

Strona 208

FIGURE 12 Using multi-device port authentication and 802.1X authentication on the same portWhen the devices attempt to connect to the network, they ar

Strona 209

that the PVID for User 1 port be changed to the VLAN named "User-VLAN", which is VLAN 3. If 802.1Xauthentication for User 1 is unsuccessful,

Strona 210 - Sample 802.1X configurations

FIGURE 13 802.1X Authentication is performed when a device fails multi-device port authenticationMulti-device port authentication is initially perform

Strona 211 - Point-to-point configuration

To configure the device to perform 802.1X authentication when a device fails multi-device portauthentication, enter the following command.device(confi

Strona 212 - Hub configuration

The command in this example configures the device to allow SNMP access only to clients connected toports within port-based VLAN 40. Clients connected

Strona 213

Example 2 -- Creating a profile on the RADIUS server for each MAC address290 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 214

Web Authentication● Supported Web Authentication features... 291● Web authenticati

Strona 215

The Brocade Web authentication method provides an ideal port-based authentication alternative tomulti-device port authentication without the complexit

Strona 216

• If you are using DHCP addressing, a DHCP server must be in the same broadcast domain as thehost. This DHCP server does not have to be physically con

Strona 217 - MAC Port Security

Web authentication configuration tasksFollow the steps given below to configure Web Authentication on a device.1. Set up any global configuration requ

Strona 218

5. Create a Web Authentication VLAN and enable Web Authentication on that VLAN.device(config)#vlan 10device(config-vlan-10)#webauthdevice(config-vlan-

Strona 219 - Secure MAC movement

Using local user databasesWeb Authentication supports the use of local user databases consisting of usernames and passwords,to authenticate devices. U

Strona 220

Syntax: username username password passwordFor username , enter up to 31 ASCII characters.For username , enter up to 29 ASCII characters.You can add u

Strona 221 - On a tagged interface

For password1 , password2 , etc., enter up to 29 ASCII characters.Be sure to Insert a cursor return (cr ) after each user record.You can enter up to 3

Strona 222

To revert back to using the RADIUS server, enter the following command.device(config-vlan-10-webauth)# auth-mode username-password auth-methods radius

Strona 224

The metric parameter specifies the metric (cost) of the gateway. You can specify a value from 1 - 5.There is no default. The software uses the gateway

Strona 225

Creating static passcodesStatic passcodes can be used for troubleshooting purposes, or for networks that want to use passcodeauthentication, but do no

Strona 226

• Duration of time - By default, dynamically-created passcodes are refreshed every 1440 minutes (24hours). When refreshed, a new passcode is generated

Strona 227 - MAC-based VLANs

hh:mm is the hour and minutes. If you do not enter a value for hh:mm , by default, passcodes will berefreshed at 00:00 (12:00 midnight). You can confi

Strona 228 - Static and dynamic hosts

The following shows an example Syslog message and SNMP trap message related to passcodeauthentication.New passcode: 01234567. Expires in 1440 minutes.

Strona 229 - Dynamic MAC-based VLAN

Automatic authenticationBy default, if Web Authentication is enabled, hosts need to login and enter authentication credentialsin order to gain access

Strona 230

Syntax: [no] accountingEnter the no accounting command to disable RADIUS accounting for Web Authentication.Changing the login mode (HTTPS or HTTP)Web

Strona 231 - MAC-based VLAN configuration

Entering a no add mac mac-addressdurationseconds|ethernetportdurationseconds command setsduration and ethernet to their default values. If you want to

Strona 232 - RADIUS server

Clearing authenticated hosts from the webauthentication tableUse the following commands to clear dynamically-authenticated hosts from the Web Authenti

Strona 233 - Aging for MAC-based VLAN

Limiting the number of authenticated hostsYou can limit the number of hosts that are authenticated at any one time by entering a command suchas the fo

Strona 234 - Globally disabling aging

Forcing re-authentication after an inactive periodYou can force Web Authenticated hosts to be re-authenticated if they have been inactive for a period

Strona 235

Disabling Telnet accessYou can use a Telnet client to access the CLI on the device over the network. If you do not plan to usethe CLI over the network

Strona 236

Deleting a web authentication VLANTo delete a Web Authentication VLAN, enter the following commands:device(config)# vlan 10device(config-vlan-10)# no

Strona 237 - Displaying the MAC-VLAN table

FIGURE 16 Example of a login page when automatic authentication is disabled and passcodeAuthentication is EnabledThe user enters a passcode, which is

Strona 238

FIGURE 18 Example of a maximum Host limit pageIf the number of Web Authentication attempts by a user has been exceeded, the Maximum AttemptsLimit page

Strona 239

FIGURE 20 Example of a web authentication success pageOnce a host is authenticated, that host can manually de-authenticate by clicking the Logout butt

Strona 240

Displaying text for web authentication pagesUse the show webauth vlan vlan-ID webpage command to determine what text has been configuredfor Web Authen

Strona 241

FIGURE 21 Objects in the web authentication pages that can be customizedCustomizing the title barYou can customize the title bar that appears on all W

Strona 242

The filename parameter specifies the name of the image file on the TFTP server.Use the no webpage logo command to delete the logo from all Web Authent

Strona 243 - Clearing MAC-VLAN information

Customizing the login buttonYou can customize the Login button that appears on the bottom of the Web Authentication Login page.To do so, enter a comma

Strona 244

Bottom (Footer): Custom Text "SNL Copyright 2009" Title: Default Text Login Button: Custom Text "Sign On" Web

Strona 245

Field DescriptionWeb Page Customizations The current configuration for the text that appears on the Web Authenticationpages. Either "Custom Text&

Strona 246

NOTEYou also can configure up to 16 user accounts consisting of a user name and password, and assigneach user account a management privilege level. Re

Strona 247 - Defining MAC Address Filters

Displaying a list of hosts attempting to authenticateEnter the show webauth authenticating-list command to display a list of hosts that are trying toa

Strona 248

Field DescriptionUser Name The User Name associated with the MAC address.Configuration Static/Dynamic If the MAC address was dynamically or statically

Strona 249

Displaying passcodes322 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 250

DoS Attack Protection● Supported DoS protection features...323● Smurf atta

Strona 251

FIGURE 22 How a Smurf attack floods a victim with ICMP repliesThe attacker sends an ICMP echo request packet to the broadcast address of an intermedia

Strona 252

For example, to set threshold values for ICMP packets targeted at the router, enter the followingcommand in global CONFIG mode.device(config)#ip icmp

Strona 253

• If the number of ICMP packets exceeds the burst-normal value, the excess ICMP packets aredropped.• If the number of ICMP packets exceeds the burst-m

Strona 254

NOTEFor ICX 7750 devices, the "attack rate" parameter is only applicable for smurf attacks and not forTCP/SYN attacks.To set threshold value

Strona 255 - Unauthenticated port behavior

Protecting against a blind TCP reset attack using the RST bitIn a blind TCP reset attack using the RST bit, a perpetrator attempts to guess the RST bi

Strona 256 - Support for dynamic ACLs

Syntax: clear statistics dos-attackDoS Attack ProtectionFastIron Ethernet Switch Security Configuration Guide 32953-1003088-03

Strona 257

on the order you specify in the authentication-method lists. Refer to Authentication-method lists on page75.Follow the steps given below to set passwo

Strona 258

Displaying statistics about packets dropped because of DoS attacks330 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 259

DHCP● Supported DHCP packet inspection and tracking features... 331● Dynamic ARP inspection ...

Strona 260

mapping. All computers on the subnet will receive and process the ARP requests, and the host whoseIP address matches the IP address in the request wil

Strona 261 - Defining MAC address filters

FIGURE 23 Dynamic ARP inspection at workARP entriesDAI uses the IP/MAC mappings in the ARP table to validate ARP packets received on untrusted ports.A

Strona 262

NOTEYou must save the configuration and reload the software to place the change into effect.• Brocade does not support DAI on trunk or LAG ports.• The

Strona 263

The ARP entry will be in Pend (pending) status until traffic with the matching IP-to-MAC is received on aport.Syntax: [no] arp ip-addr mac-addr inspec

Strona 264

2 10.43.1.78 0000.0060.6ab1 Dynamic 2 mgmt1 ValidThe command displays all ARP entries i

Strona 265

other users. DHCP snooping can also stop unauthorized DHCP servers and prevent errors due to usermis-configuration of DHCP servers.Often DHCP snooping

Strona 266

The lease time will be refreshed when the client renews its IP address with the DHCP server;otherwise the Brocade device removes the entry when the le

Strona 267

Configuring DHCP snoopingConfiguring DHCP snooping consists of the following steps.1. Enable DHCP snooping on a VLAN.Refer to Enabling DHCP snooping o

Strona 268

Enhance the Port Configuration privilege level so users also can enter IP commands at the globalCONFIG level.device(config)#privilege configure level

Strona 269

Clearing the DHCP binding databaseYou can clear the DHCP binding database using the CLI command clear DHCP . You can remove allentries in the database

Strona 270

DHCP snooping configuration exampleThe following example configures VLAN 2 and VLAN 20, and changes the CLI to the globalconfiguration level to enable

Strona 271

Syntax: enable acl-per-port-per-vlan• Configure DHCP IPv4 snooping on a specific VLAN using ip dhcp snooping vlan vlan-id . Forexample:Brocade(config)

Strona 272

• Before relaying a DHCP discovery packet or DHCP request packet from a client to a DHCP server,the FastIron switch will add agent information to the

Strona 273

DHCP Option 82 sub-optionsThe Brocade implementation of DHCP Option 82 supports the following sub-options:• Sub-Option 1 - Circuit ID• Sub-Option 2 -

Strona 274

The following figure illustrates the SID packet format.FIGURE 30 SID packet formatThe second byte (N in the figure) is the length of the ASCII string

Strona 275 - MAC address or port

To re-enable DHCP option 82 on an interface after it has been disabled, enter the following commandat the Interface level of the CLI.device(config-if-

Strona 276

Use the show interfaces ethernet command to view the subscriber ID configured on a port.Refer to Viewing the status of DHCP option 82 and the subscrib

Strona 277 - MAC addresses

Output for the show ip dhcp snooping vlan commandTABLE 35 Field DescriptionIP DHCP snooping VLAN vlan-id The DHCP snooping and DHCP option 82 status

Strona 278

Configuring the source IP address of a DHCP-client packet on the DHCPrelay agentEnables the DHCP server to know the source subnet or network of a DHCP

Strona 279

1. Start a CLI session over the serial interface to the device.2. Reboot the device.3. At the initial boot prompt at system startup, enter b to enter

Strona 280

NOTEYou must save the configuration and reload the software to place the change into effect.• Brocade FCX devices do not support IP Source Guard and d

Strona 281

Enabling IP source guard on a portYou can enable IP Source Guard on DHCP snooping untrusted ports. Refer to DHCP snooping on page336 for how to config

Strona 282

device(config-vlan-2)#tag e1Added tagged port(s) ethe 1 to port-vlan 2device(config-vlan-2)#router-int ve 2device(config-vlan-2)#int ve 2device(config

Strona 283

for FWS, FCX, and ICX stackable switches.Syntax: show ip source-guard ethernet slotnum/portnumfor FSX, 800, and FSX 1600 chassis devices.DHCPFastIron

Strona 284

Displaying learned IP addresses354 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 285

DHCPv6● Supported DHCPv6 packet inspection and tracking features... 355● Securing IPv6 address configuration...

Strona 286

How DHCPv6 snooping worksWhen enabled on a VLAN, DHCPv6 snooping stands between untrusted ports (those connected tohost ports) and trusted ports (thos

Strona 287

Configuration notes and feature limitations for DHCPv6 snoopingThe following limits and restrictions apply to DHCPv6 snooping:• To run DHCPv6 snooping

Strona 288

Enabling trust on a port connected to a DHCPv6 serverThe default trust setting for a port is untrusted. To enable trust on a port connected to a DHCPv

Strona 289

Syntax: show ipv6 dhcp6 snooping vlan vlan-idDisplaying the DHCPv6 snooping binding databaseTo see DHCPv6 snooping binding database, enter the show ip

Strona 290

If you configure local user accounts, you also need to configure an authentication-method list forTelnet access and SNMP access. Refer to Authenticati

Strona 291 - Web Authentication

Syntax: enable acl-per-port-per-vlan• Configure DHCPv6 snooping on a specific VLAN using ipv6 dhcp6 snooping vlan vlan-id. Forexample:Brocade(config)#

Strona 292

IPv6 RA Guard● Supported platforms for the IPv6 RA guard feature... 361● Securing IPv6 address conf

Strona 293

link. This helps the nodes to autoconfigure themselves on the network. Unintended misconfigurationsor malicious attacks on the network lead to false R

Strona 294

the VLAN the ports are a part of. By default, all interfaces are configured as host ports. On a host port,all the RAs are dropped with a policy config

Strona 295

10.(Optional) Clear the RA packet counter using the clear ipv6 raguard command.11.(Optional) Verify the RA packet counts using the show ipv6 raguard c

Strona 296 - Using local user databases

FIGURE 33 IPv6 RA guard configuration in a networkConfiguring port A:Configure port A as a trusted port.Brocade(config)# interface ethernet 1/1/1Broca

Strona 297

Brocade(config)# prefix-list raguard-prefix-list1 permit 2001:db8::/16Brocade(config)# ipv6 raguard policy policyBBrocade(ipv6-RAG-policy policyB)# wh

Strona 298

Security Commands● access-list enable accounting... 368● clear acc

Strona 299

access-list enable accountingConfigures ACL accounting.Enables ACL accounting for IPv4 numbered ACLs.The no form disables ACL accounting for IPv4 numb

Strona 300 - Creating static passcodes

clear access-list accountingClears ACL accounting statistics.Clears ACL accounting statistics for IPv4 ACLs, IPv6 ACLs, and Layer 2 MAC filters.Syntax

Strona 301

NOTEPassword minimum and combination requirements are strictly enforced.Use the enable strict-password-enforcement command to enable the password secu

Strona 302

ModesGlobal configurationUsage GuidelinesTo clear RA guard packet counters for all RA guard policies, use the all keyword. To clear the RA guardpacket

Strona 303

enable-accountingConfigures ACL accountingEnables ACL accounting for IPv4 and IPv6 named ACLs.The no form disables ACL accounting for IPv4 and IPv6 na

Strona 304 - Automatic authentication

RA packets drop due to congestion if they are received at the line rate. For less load on the CPU,logging can be disabled on the RA guard policy.Examp

Strona 305 - Specifying trusted ports

Usage GuidelinesYou can associate only one RA guard policy with a VLAN. If you associate a new RA guard policy witha VLAN that already has a policy co

Strona 306

mac filter enable-accountingConfigures ACL accounting for MAC filters.Enables ACL accounting on Layer 2 MAC filters.The no form disables ACL accountin

Strona 307

Allows RAs of low and medium router preference.ModesRA guard policy configurationUsage GuidelinesIf a very low value is set, then the RAs expected to

Strona 308 - Filtering DNS queries

Configures an interface as a trusted RA guard port.untrustConfigures an interface as an untrusted RA guard port.hostConfigures an interface as a host

Strona 309

show access-list accountingDisplays ACL accounting statisticsDisplays ACL accounting statistics for IPv4 ACLs, IPv6 ACLs, and Layer 2 MAC filters.Synt

Strona 310 - Web authentication pages

ExamplesThe output displayed will give information about IPv4 ACLs or IPv6 ACLs, or MAC filters based on theconfiguration of the port or interface. If

Strona 311

The following sample output from the FastIron SX device shows the per-port display when the devicehas "acl-per-port-per-vlan" configured for

Strona 312

To enable password masking, enter the following command.device(config)#enable user password-maskingSyntax: [no] enable user password-maskingEnabling u

Strona 313

Hit Count: (1Min) N/A (5Sec) N/A (PktCnt) N/A (ByteCnt) 0 -------------------

Strona 314

Displays the permit or drop counts for the specified RA guard policy.allDisplays the permit or drop counts for all RA guard policies.ModesGlobal confi

Strona 315 - Customizing the title bar

ip bootp-use-intf-ipConfigures the source IP address of a DHCP-client packet in a DHCP relay agent.Configures a DHCP relay agent to set the source IP

Strona 316 - Customizing the text box

The no form of this command removes the associated RA guard whitelist from the RA guard policy.When a whitelist associated with an RA guard policy is

Strona 317 - Customizing the footer

whitelist384 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 318

Index802.1x port securityaccounting 180accounting attributes for RADIUS802.1x port securityFastIron Ethernet Switch Security Configuration Guide 38553

Strona 319

enabling accounting 199accounting configuration 199allowing access to multiple hosts 195and sFlow 180applying IP ACLs and MAC address filters 187authe

Strona 320

accounting, pre-requisites for ACL accounting 141adding a comment to an entry 124adding a comment to an IPv6 entry 165applying an IPv4 ACL to a subset

Strona 321 - Displaying passcodes

TCP flags 76aaa authorization commands 70aaa authorization commands < 55access-list 108, 112, 123, 137, 145accounting 304ACL-logging 127age 220all-

Strona 322

auth-fail-action restricted-vlan 195auth-fail-action restrict-vlan 195auth-fail-max-attempts 195auth-fail-vlanid 195auth-max 193dot1x disable-filter-s

Strona 323 - DoS Attack Protection

Enhanced login lockoutThe CLI provides up to three login attempts. If a user fails to login after three attempts, that user islocked out (disabled). I

Strona 324

age 220arp inspection trust 335dhcp snooping relay information 345dhcp snooping relay information option subscriber-id 346dot1x auth-filter 251dot1x a

Strona 325

aging 233and port up or down events 229clearing information 243configuration 231configuring for a dynamic host 236configuring for a static host 235con

Strona 326 - TCP SYN attacks

changing a local user password 41configuring 36configuring password history 38enabling user password aging 38enabling user password masking 37enhanced

Strona 327 - TCP security enhancement

configuring challenge-response authentication 86enabling challenge-response 87exporting client public keys 98generating a client key pair 98generating

Strona 328

SSH2DSA challenge-response authentication 83password authenticationSSH2configuration 83RSA challenge-response authentication 83use with secure copy 93

Strona 329

auth-mode passcode static 300auth-mode username-password auth-methods 299auth-mode username-password auth-methodslocal 298auth-mode username-password

Strona 330

396 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 331 - Dynamic ARP inspection

Setting optional TACACS and TACACS+ parameters...49Configuring authentication-method lists forTACACS andTACACS+...

Strona 332 - About Dynamic ARP Inspection

Local user account configurationYou can create accounts for local users with or without passwords. Accounts with passwords can haveencrypted or unencr

Strona 333 - ARP entries

The password | nopassword parameter indicates whether the user must enter a password. If youspecify password , enter the string for the user's pa

Strona 334

TACACS and TACACS+ securityYou can use the security protocol Terminal Access Controller Access Control System (TACACS) orTACACS+ to authenticate the f

Strona 335 - Displaying the ARP table

Configuring TACACS/TACACS+ for devices in a Brocade traditional stackBecausedevices operating in a Brocade traditional stack topology present multiple

Strona 336 - DHCP snooping

you are connecting to this session 1 minutes 5 seconds in idle 2 established 1 hours 4 minutes 18 seconds in idle 3 es

Strona 337 - How DHCP snooping works

TACACS+ authorizationBrocade devices support two kinds of TACACS+ authorization:• Exec authorization determines a user privilege level when they are a

Strona 338

User action Applicable AAA operationsSystem accounting start (TACACS+):aaa accounting system default start-stop method-listUser logs in using Telnet/S

Strona 339 - Configuring DHCP snooping

AAA security for commands pasted into the running-configIf AAA security is enabled on the device, commands pasted into the running-config are subject

Strona 340

Enabling TACACSTACACS is disabled by default. To configure TACACS/TACACS+ authentication parameters, youmust enable TACACS by entering the following c

Strona 341 - Multi-VRF support

The auth-port parameter specifies the UDP (for TACACS) or TCP (for TACACS+) port number ofthe authentication port on the server. The default port numb

Strona 342 - DHCP relay agent information

Filtering SSH access using ACLs... 90Terminating an active SSH connection...

Strona 343

To specify a TACACS+ server key, enter a command such as following.device(config)#tacacs-server key rkwongSyntax: tacacs-server key [ 0 ] stringWhen y

Strona 344 - DHCP Option 82 sub-options

When you configure authentication-method lists for TACACS/TACACS+ authentication, you must createa separate authentication-method list for Telnet/SSH

Strona 345 - DHCP option 82 configuration

Authentication method values (Continued)TABLE 3 Method parameter Descriptionnone Do not use any authentication method. The device automatically perm

Strona 346

Configuring TACACS+ authorizationBrocade devices support TACACS+ authorization for controlling access to management functions in theCLI. Two kinds of

Strona 347

are 0 for super-user level, 4 for port-config level, or 5 for read-only level. If a value other than 0, 4, or 5is specified in the foundry-privlvl A-V

Strona 348

Configuring command authorizationWhen TACACS+ command authorization is enabled, the Brocade device consults a TACACS+ serverto get authorization for c

Strona 349 - IP source guard

Configuring TACACS+ accounting for Telnet/SSH (Shell) accessTo send an Accounting Start packet to the TACACS+ accounting server when an authenticated

Strona 350

Switch. For configuration details, see "Specifying a single source interface for specified packet types"section in the FastIron Ethernet Swi

Strona 351

RADIUS securityYou can use a Remote Authentication Dial In User Service (RADIUS) server to secure the followingtypes of access to the Brocade Layer 2

Strona 352

3. If the command belongs to a privilege level that requires authorization, the Brocade device looks atthe list of commands delivered to it in the RAD

Strona 353

Applying an IPv4 ACL to a subset of ports on a virtual interface(Layer 3 devices only)...

Strona 354

User action Applicable AAA operationsEXEC accounting Start:aaa accounting exec default start-stop method-listSystem accounting Start:aaa accounting sy

Strona 355 - DHCPv6 snooping

AAA operations are performed before the commands are actually added to the running-config. Theserver performing the AAA operations should be reachable

Strona 356 - How DHCPv6 snooping works

8. Optionally configure RADIUS authorization. Refer to RADIUS authorization on page 69.9. Optionally configure RADIUS accounting. Refer to RADIUS acco

Strona 357 - Configuring DHCPv6 snooping

Brocade vendor-specific attributes for RADIUS (Continued)TABLE 6 Attribute name Attribute ID Data type Descriptionfoundry-command-exception-flag3 in

Strona 358

The config-radius parameter specifies the RADIUS configuration mode. RADIUS is disabled bydefault.The config-tacacs parameter specifies the TACACS con

Strona 359

RADIUS server per port configuration notes• This feature works with 802.1X and multi-device port authentication only.• You can define up to eight RADI

Strona 360

RADIUS server-to-ports configuration notes• This feature works with 802.1X and multi-device port authentication only.• You can map a RADIUS server to

Strona 361 - IPv6 RA Guard

NOTEEncryption of the RADIUS keys is done by default and the default value is 2( SIMPLE_ENCRYPTION_BASE64). The 0 parameter disables encryption. The 1

Strona 362 - Maximum preference

When you configure authentication-method lists for RADIUS, you must create a separateauthentication-method list for Telnet or SSH CLI access and for C

Strona 363 - Configuring IPv6 RA guard

Authentication method values (Continued)TABLE 7 Method parameter Descriptionnone Do not use any authentication method. The device automatically perm

Strona 364

802.1X Port Security...169Supported 802.1X p

Strona 365 - Configuring port B:

Syntax: aaa authorization exec default [ radius | none ]If you specify none , or omit the aaa authorization exec command from the device configuration

Strona 366

Command authorization and accounting for console commandsThe Brocade device supports command authorization and command accounting for CLI commandsente

Strona 367 - Security Commands

NOTEIf authorization is enabled, and the command requires authorization, then authorization is performedbefore accounting takes place. If authorizatio

Strona 368

Output of the show aaa command for RADIUS TABLE 8 Field DescriptionRadius key The setting configured with the radius-server key command. At the Supe

Strona 369

Changing the SSL server certificate key sizeThe default key size for Brocade-issued and imported digital certificates is 1024 bits. If desired, youcan

Strona 370

Generating an SSL certificateIf the certificate does not automatically generate, enter the following command togenerate it.Brocade(config)#crypto-ssl

Strona 371

In an authentication-method list for a particular access method, you can specify up to sevenauthentication methods. If the first authentication method

Strona 372

Note that the above configuration can be overridden by the command no snmp-server pw-check ,which disables password checking for SNMP SET requests.Exa

Strona 373

Authentication method values (Continued)TABLE 9 Method parameter Descriptionlocal Authenticate using a local user name and password you configured o

Strona 374

Using TCP Flags in combination with other ACL featuresThe TCP Flags feature has the added capability of being combined with other ACL features.device(

Strona 375

MAC port security configuration...219Enabling the MAC port security feature...

Strona 376

Using TCP Flags in combination with other ACL features80 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Strona 377

SSH2 and SCP● Supported SSH2 and Secure Copy features... 81● SSH version 2 overview...

Strona 378

used. The highest version of SSH2 supported by both the Brocade device and the client is the versionthat is used for the session. Once the SSH2 versio

Strona 379

• Encryption is provided with 3des-cbc , aes128-cbc , aes192-cbc or aes256-cbc . AES encryptionhas been adopted by the U.S. Government as an encryptio

Strona 380

Enabling and disabling SSH by generating and deleting host keysTo enable SSH, you generate a DSA or RSA host key on the device. The SSH server on the

Strona 381

Generating and deleting an RSA key pairTo generate an RSA key pair, enter a command such as the following:device(config)#crypto key generate rsa modul

Strona 382

Configuring DSA or RSA challenge-response authenticationWith DSA or RSA challenge-response authentication, a collection of clients’ public keys are st

Strona 383

The tftp-server-ip-addr variable is the IP address of the tftp server that contains the public key file thatyou want to import into the Brocade device

Strona 384

Optional SSH parametersYou can adjust the following SSH settings on the Brocade device:• The number of SSH authentication retries• The user authentica

Strona 385 - 802.1x port security

The default is yes .To deactivate password authentication, enter the following command.device(config)#ip ssh password-authentication noSyntax: ip ssh

Strona 386

MAC address filter logging command syntax...250Configuring MAC filter accounting...

Strona 387

Designating an interface as the source for all SSH packetsYou can designate a loopback interface, virtual interface, or Ethernet port as the source fo

Strona 388

Displaying SSH connection informationTo display information about SSH connections, enter the show ip ssh command.device#show ip sshConnection Version

Strona 389

SCP : EnabledSSH IPv4 clients : AllSSH IPv6 clients : AllSSH IPv4 access-group :SSH IPv6 access-group

Strona 390

Displaying additional SSH connection informationThe show who command also displays information about SSH connections:device#show who Console con

Strona 391

Example file transfers using SCPThe following are examples of using SCP to transfer files to and from a Brocade device.Copying a file to the running c

Strona 392

To copy a software image file from an SCP-enabled client to the secondary flash on these devices,enter one of the following commands.C:\> scp FCXR0

Strona 393

Importing an RSA private keyTo import an RSA private key from a client using SCP, enter a command such as the following one:C:\> scp keyfile user@1

Strona 394

while you are connected to the device by any connection method (SSH2, Telnet, console). Brocadedevices support one outbound SSH2 client session at a t

Strona 395

Generating and deleting a client RSA key pairTo generate a client RSA key pair, enter a command such as the following:device(config)#crypto key client

Strona 396

Displaying SSH2 client informationFor information about displaying SSH2 client information, see the following sections:• Displaying SSH connection inf

Komentarze do niniejszej Instrukcji

Brak uwag