Securing access methods

TABLE 2 Ways to secure management access to Brocade devices (Continued)

Access method

How the access

Ways to secure the access method

 

method is secured

 

 

by default

 

 

 

 

Access to the Privileged

Not secured

Establish a password for Telnet access to the CLI

EXEC and CONFIG levels of

 

 

 

Establish passwords for management privilege levels

the CLI

 

 

 

 

 

Set up local user accounts

 

 

 

 

 

Configure TACACS/TACACS+ security

 

 

 

 

 

Configure RADIUS security

 

 

 

Telnet access

Not secured

Regulate Telnet access using ACLs

 

 

 

 

 

Allow Telnet access only from specific IP addresses

 

 

 

 

 

Restrict Telnet access based on a client MAC address

 

 

 

 

 

Allow Telnet access only from specific MAC addresses

 

 

 

 

 

Define the Telnet idle time

 

 

 

 

 

Change the Telnet login timeout period

 

 

 

 

 

Specify the maximum number of login attempts for

 

 

Telnet access

 

 

 

 

 

Disable Telnet access

 

 

 

 

 

Establish a password for Telnet access

 

 

 

 

 

Establish passwords for privilege levels of the CLI

 

 

 

 

 

Set up local user accounts

 

 

 

 

 

Configure TACACS/TACACS+ security

 

 

 

 

 

Configure RADIUS security

 

 

 

Secure Shell (SSH) access

Not configured

Configure SSH

 

 

 

 

 

Regulate SSH access using ACLs

 

 

 

 

 

Allow SSH access only from specific IP addresses

 

 

 

 

 

Allow SSH access only from specific MAC addresses

 

 

 

 

 

Establish passwords for privilege levels of the CLI

 

 

 

 

 

Set up local user accounts

 

 

 

 

 

Configure TACACS/TACACS+ security

 

 

 

 

 

Configure RADIUS security

2

Brocade ICX 6650 Security Configuration Guide

 

53-1002601-01

Page 22
Image 22
Brocade Communications Systems 6650 manual Method is secured