Remote access to management function restrictions

The num parameter specifies the number of a standard ACL and must be from 1–99.

These commands configure ACL 12, then apply the ACL as the access list for SSH access. The device denies SSH access from the IP addresses listed in ACL 12 and permits SSH access from all other IP addresses. Without the last ACL entry for permitting all packets, this ACL would deny SSH access from all IP addresses.

NOTE

In this example, the command ssh access-group 10 could have been used to apply the ACL configured in the example for Telnet access. You can use the same ACL multiple times.

Using ACLs to restrict SNMP access

To restrict SNMP access to the device using ACLs, enter commands such as the following.

NOTE

The syntax for using ACLs for SNMP access is different from the syntax for controlling Telnet, SSH, access using ACLs.

Brocade(config)# access-list 25 deny host 10.157.22.98 log Brocade(config)# access-list 25 deny 10.157.23.0 0.0.0.255 log Brocade(config)# access-list 25 deny 10.157.24.0 0.0.0.255 log Brocade(config)# access-list 25 permit any Brocade(config)# access-list 30 deny 10.157.25.0 0.0.0.255 log Brocade(config)# access-list 30 deny 10.157.26.0/24 log Brocade(config)# access-list 30 permit any Brocade(config)# snmp-server community public ro 25 Brocade(config)# snmp-server community private rw 30 Brocade(config)# write memory

Syntax: snmp-server community string ro rw num

The string parameter specifies the SNMP community string you must enter to gain SNMP access.

The ro parameter indicates that the community string is for read-only (“get”) access. The rw parameter indicates the community string is for read-write (“set”) access.

The num parameter specifies the number of a standard ACL and must be from 1 – 99. These commands configure ACLs 25 and 30, then apply the ACLs to community strings.

ACL 25 is used to control read-only access using the “public” community string. ACL 30 is used to control read-write access using the “private” community string.

NOTE

When snmp-server community is configured, all incoming SNMP packets are validated first by their community strings and then by their bound ACLs.

Defining the console idle time

By default, a Brocade device does not time out serial console sessions. A serial session remains open indefinitely until you close it. You can however define how many minutes a serial management session can remain idle before it is timed out.

Brocade ICX 6650 Security Configuration Guide

5

53-1002601-01

 

Page 25
Image 25
Brocade Communications Systems 6650 manual Defining the console idle time, Using ACLs to restrict Snmp access