show dot1x statistics, 187 show interface, 188 show ip access-list,103 show ip arp inspection, 283 show ip client-pub-key,69

show ip dhcp relay information, 293 show ip dhcp snooping, 287 show ip ssh, 72

show ip ssh config, 73

show ipv6 access-list,130, 139 show log, 107

show logging, 227 show mac-address,226

show port security ethernet, 208, 210 show port security mac, 208

show port security statistics, 209 show rate-limit fixed, 275

show rate-limit output-shaping,277 show run, 19

show statistics dos-attack,271 show table-mac-vlan,221, 225, 229 show table-mac-vlan denied-mac,223 show who, 74

show-traffic policy, 152 Smurf attack protection, 267

SNMP

displaying community string, 16 enabling to configure RADIUS, 47

generating traps for multi-device port authentication, 239

using to configure MAC-based VLANs, 221

SSH

configuring maximum idle time, 71

designating an interface as the source for all packets, 71

displaying information, 72 filtering access using ACLs, 72 setting login timeout value, 71 setting port number, 71 terminating an active connection, 72

SSH authentication

setting the number of retries, 70 SSH2

configuration, 65

DSA challenge-response authentication, 65 password authentication, 65

RSA challenge-response authentication, 65 use with secure copy, 75

SSH2 client

configuring public key authentication, 78 displaying information, 80

enabling, 78

overview, 78 using, 79

T

TACACS authentication, 27 enabling, 31

TACACS and TACACS+

authentication, authorization, and accounting, 25 configuration, 30

configuration considerations, 30 configuring an interface for all packets, 40 configuring authentication-method lists, 34 configuring for devices in a Brocade IronStack, 25 how they differ, 24

identifying servers, 31 security, 24

setting optional parameters, 32 setting the retransmission limit, 33

TACACS+ accounting, 28 accounting configuration, 39 authorization, 28 configuring authorization, 36

prompts when server is unavailable, 35 setting the key, 33

specifying servers for individual AAA functions, 32 TCP flags, 59, 60

TCP flags and edge port security, 114 Test-Route

set ip next hop, 123 traffic policies

configuration notes and feature limitations, 143 CoS parameters for packets, 145

CPU rate-limiting,277 overview, 299 viewing, 152

U

user accounts defining local, 17 local configuration, 21

local with encrypted passwords, 23 local with no passwords, 22

local with unencrypted passwords, 22 user authentication, deactivating, 70 username

310

Brocade ICX 6650 Security Configuration Guide

 

53-1002601-01

Page 330
Image 330
Brocade Communications Systems 6650 manual Ssh