310 Brocade ICX 6650 Security Configuration Guide
53-1002601-01
show dot1x statistics, 187
show interface, 188
show ip access-list, 103
show ip arp inspection, 283
show ip client-pub-key, 69
show ip dhcp relay information, 293
show ip dhcp snooping, 287
show ip ssh, 72
show ip ssh config, 73
show ipv6 access-list, 130, 139
show log, 107
show logging, 227
show mac-address, 226
show port security ethernet, 208, 210
show port security mac, 208
show port security statistics, 209
show rate-limit fixed, 275
show rate-limit output-shaping, 277
show run, 19
show statistics dos-attack, 271
show table-mac-vlan, 221, 225, 229
show table-mac-vlan denied-mac, 223
show who, 74
show-traffic policy, 152
Smurf attack protection, 267
SNMP
displaying community string, 16
enabling to configure RADIUS, 47
generating traps for multi-device port authentication,
239
using to configure MAC-based VLANs, 221
SSH
configuring maximum idle time, 71
designating an interface as the source for all packets,
71
displaying information, 72
filtering access using ACLs, 72
setting login timeout value, 71
setting port number, 71
terminating an active connection, 72
SSH authentication
setting the number of retries, 70
SSH2
configuration, 65
DSA challenge-response authentication, 65
password authentication, 65
RSA challenge-response authentication, 65
use with secure copy, 75
SSH2 client
configuring public key authentication, 78
displaying information, 80
enabling, 78
overview, 78
using, 79
T
TACACS
authentication, 27
enabling, 31
TACACS and TACACS+
authentication, authorization, and accounting, 25
configuration, 30
configuration considerations, 30
configuring an interface for all packets, 40
configuring authentication-method lists, 34
configuring for devices in a Brocade IronStack, 25
how they differ, 24
identifying servers, 31
security, 24
setting optional parameters, 32
setting the retransmission limit, 33
TACACS+
accounting, 28
accounting configuration, 39
authorization, 28
configuring authorization, 36
prompts when server is unavailable, 35
setting the key, 33
specifying servers for individual AAA functions, 32
TCP flags, 59, 60
TCP flags and edge port security, 114
Test-Route
set ip next hop, 123
traffic policies
configuration notes and feature limitations, 143
CoS parameters for packets, 145
CPU rate-limiting, 277
overview, 299
viewing, 152
U
user accounts
defining local, 17
local configuration, 21
local with encrypted passwords, 23
local with no passwords, 22
local with unencrypted passwords, 22
user authentication, deactivating, 70
username