Chapter

Security Access

1

 

 

 

 

Table 1 lists the security access features supported on Brocade ICX 6650. These features are supported in the Layer 2, base Layer 3, edge Layer 3, and full Layer 3 software images, except where explicitly noted.

TABLE 1 Supported security access features

Feature

Brocade ICX 6650

 

 

Authentication, Authorization and

Yes

Accounting (AAA):

 

RADIUS

TACACS/TACACS+

AAA support for console commands

Yes

 

 

Restricting remote access to management

Yes

functions

 

 

 

Disabling TFTP access

Yes

 

 

Using ACLs to restrict remote access

Yes

 

 

Local user accounts

Yes

 

 

Local user passwords

Yes

 

 

AAA authentication-method lists

Yes

 

 

Packet filtering on TCP flags

Yes

 

 

This chapter explains how to secure access to management functions on a Brocade device.

NOTE

For the Brocade ICX 6650, RADIUS Challenge is supported for 802.1x authentication but not for login authentication. Also, multiple challenges are supported for TACACS+ login authentication.

Securing access methods

The following table lists the management access methods available on a Brocade device, how they are secured by default, and the ways in which they can be secured.

TABLE 2 Ways to secure management access to Brocade devices

Access method

How the access

Ways to secure the access method

 

method is secured

 

 

by default

 

 

 

 

Serial access to the CLI

Not secured

Establish passwords for management privilege levels

Brocade ICX 6650 Security Configuration Guide

1

53-1002601-01

 

Page 21
Image 21
Brocade Communications Systems 6650 manual Securing access methods, Feature Brocade ICX