Brocade FastIron Ethernet Switch Security Configuration Gu Manual de usuario

Busca en linea o descarga Manual de usuario para Accesorios De Computador Brocade FastIron Ethernet Switch Security Configuration Gu. Brocade FastIron Ethernet Switch Security Configuration Guide User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 396
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - FastIron Ethernet Switch

53-1003088-0330 July 2014FastIron Ethernet SwitchSecurity Configuration GuideSupporting FastIron Software Release 08.0.10d

Pagina 2

Web Authentication... 291Supported Web Authen

Pagina 3 - Contents

Displaying SSH2 client information100 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 4

Rule-Based IP ACLs● Supported Rule-Based IP ACL Features... 101● ACL overview...

Pagina 5

Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800FSX 1600ICX 7750Hardware-based ACLs 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.10ACL

Pagina 6

Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800FSX 1600ICX 7750ACL logging of denied packets No No No No No No NoACL logging with traffic rate

Pagina 7

listed in the Supported ACL features on inbound traffic and Supported ACL features on outboundtraffic tables respectively and discussed in more detail

Pagina 8

combination in different ACLs. The total number of entries in all ACLs cannot exceed the systemmaximum listed in the following table.Maximum number of

Pagina 9

How hardware-based ACLs workWhen you bind an ACL to inbound or outbound traffic on an interface, the device programs the Layer 4CAM with the ACL. Perm

Pagina 10 - 53-1003088-03

• Inbound ACLs apply to all traffic, including management traffic. By default outbound ACLs are notapplied to traffic generated by the CPU. This must

Pagina 11

Standard numbered ACL syntaxSyntax: [no] access-list ACL-num { deny | permit } { source-ip | hostnamewildcard } [ log ]orSyntax: [no] access-list ACL-

Pagina 12

The log argument configures the device to generate Syslog entries and SNMP traps for inboundpackets that are denied by the access policy.The in | out

Pagina 13 - Document conventions

Dynamic ARP inspection configuration... 334Displaying ARP inspection status and ports...

Pagina 14 - Notes, cautions, and warnings

Syntax: [no] ip access-list standard {ACL-name |ACL-num } { deny | permit } { source-ip |hostname } [ log ]Syntax: [no] ip access-list standard {ACL-n

Pagina 15 - Getting technical help

NOTEIf you use the CIDR format, the ACL entries appear in this format in the running-config and startup-config files, but are shown with subnet mask i

Pagina 16 - Document feedback

Extended numbered ACL configurationThis section describes how to configure extended numbered ACLs.Extended ACLs let you permit or deny packets based o

Pagina 17 - About This Document

If you prefer to specify the wildcard (mask value) in Classless Interdomain Routing (CIDR) format, youcan enter a forward slash after the IP address,

Pagina 18

The tcp/udp comparison operator parameter specifies a comparison operator for the TCP or UDP portnumber. This parameter applies only when you specify

Pagina 19 - Security Access

• network or 7 - The ACL matches packets that have the network control precedence. If you specifythe option number instead of the name, specify number

Pagina 20 - Securing access methods

The dscp-matching option matches on the packet’s DSCP value. Enter a value from 0 - 63. Thisoption does not change the packet’s forwarding priority th

Pagina 21

The second entry denies IGMP traffic from the host device named "rkwong" to the 10.157.21.x network.The third entry denies IGMP traffic from

Pagina 22

Extended named ACL configurationThe commands for configuring named ACL entries are different from the commands for configuringnumbered ACL entries. Th

Pagina 23

The wildcard parameter specifies the portion of the source IP host address to match against. Thewildcard is in dotted-decimal notation (IP address for

Pagina 24

Example: Configuring IPv6 RA guard on a device...364Example: Configuring IPv6 RA guard in a network...364

Pagina 25 - Remote access restrictions

NOTEThe QoS options listed below are only available if a specific ICMP type is specified for the icmp-typeparameter and cannot be used with the any-ic

Pagina 26 - Restricting Telnet connection

• flash-override or 4 - The ACL matches packets that have the flash override precedence. If youspecify the option number instead of the name, specify

Pagina 27 - Defining the Telnet idle time

NOTEThe dscp-cos-mapping option is supported on FSX devices only.The dscp-marking option enables you to configure an ACL that marks matching packets w

Pagina 28

To enable this feature, enter the ip preserve-ACL-user-input-format command.device(config)#ip preserve-ACL-user-input-formatSyntax: ip preserve-ACL-us

Pagina 29

Syntax: [no] ip access-list [ standard | extended ] ACL-numSyntax:remark comment-textFor ACL-num , enter the number of the ACL.The comment-text can be

Pagina 30 - Device management security

The following shows the comment text for a numbered ACL, ACL 100, in a show running-configdisplay.device#show running-config...access-list 100 remark

Pagina 31 - Disabling TFTP access

ACL loggingBrocade devices support ACL logging of inbound packets that are sent to the CPU for processing(denied packets).NOTEACL logging is not suppo

Pagina 32 - Setting a Telnet password

NOTEThe above limitation applies only to IPv4 ACLs, it does not apply to the use of ACLs to log IPv6 traffic.• When ACL logging is enabled on Brocade

Pagina 33

The above commands create ACL entries that include the log option, then bind the ACL to interface e9/12. Statistics for packets that match the deny st

Pagina 34

or applies the interface's ACL entries to the packet and permits or denies the packet according to thefirst matching ACL.• For other fragments of

Pagina 35 - Local user accounts

Preface● Document conventions...13● Brocade resources

Pagina 36

device(config-vlan-101)#router-interface ve 101device(config-vlan-101)#exitdevice(config)#enable ACL-per-port-per-vlandevice(config)#ip access-list ex

Pagina 37

202, 203, and 204, but not 300, 401, 600, and 900. See the release notes for a list of supportedmodules.• Brocade devices do not support a globally-co

Pagina 38 - Configuring password history

Applying an IPv4 ACL to a subset of ports on a virtual interface (Layer 3devices only)NOTEThis section applies to IPv4 ACLs only. IPv6 ACLs do not sup

Pagina 39 - Setting passwords to expire

address. This behavior can cause a condition called "ARP hijacking", when two hosts with the same IPaddress try to send an ARP request to th

Pagina 40

The access-list-number parameter identifies the ID of the standard ACL that will be used to filter thepacket. Only the source and destination IP addre

Pagina 41

precedence 6device(config)#access-list 103 permit ip any any The first entry in this ACL denies TCP traffic from the 10.157.21.x network to the 10.157

Pagina 42 - TACACS and TACACS+ security

• dscp-marking - Marks the DSCP value in the outgoing packet with the value you specify.• internal-priority-marking and 802.1p-priority-marking - Supp

Pagina 43

The dscp-cos-mapping option maps the DSCP value in incoming packets to a hardware table thatprovides mapping of each of the 0 - 63 DSCP values, and di

Pagina 44 - TACACS authentication

provide DSCP-marking and DSCP-matching information in order to assign 802.1p priority values,which required the deployment of a 64-line ACL to match a

Pagina 45 - TACACS+ accounting

Syntax: access-list num (100-199) permit tcp any any 802.1p-priority-marking priority value (0-7) [internal-priority-marking value (0-7) ]For UDPdevic

Pagina 46

Convention Descriptionvalue In Fibre Channel products, a fixed value provided as input to a commandoption is printed in plain text, for example, --sho

Pagina 47 - Configuring TACACS+

DSCP matchingThe dscp-matching option matches on the packet DSCP value. This option does not change thepacket forwarding priority through the device o

Pagina 48 - Enabling TACACS

ACL accountingACL accounting helps to collect usage information for access lists configured on the device. Counters,stored in hardware, keep track of

Pagina 49 - Setting the TACACS+ key

------------------------------------------------- 65533: Implicit ND_NA Rule: permit any any Hit Count: (1Min) 0 (5Sec)

Pagina 50 - Setting the timeout parameter

by the show access-list access-list-id command to determine the hardware usage for an ACL. Togain more hardware resources, you can modify the ACL rule

Pagina 51

use: 3)permit udp host 192.168.2.169 any (Flows: N/A, Packets: N/A, Rule cam use: 1)permit icmp any any (Flows: N/A, Packets: N/A, Rule cam use: 1)den

Pagina 52

• You cannot apply PBR on a port if that port already has ingress ACLs, ACL-based rate limiting,DSCP-based QoS, MAC address filtering.• The number of

Pagina 53

NOTEDo not use an access group to apply the ACL to an interface. Instead, use a route map to apply theACL globally or to individual interfaces for PBR

Pagina 54

NOTEIf you use the CIDR format, the ACL entries appear in this format in the running-config and startup-config files, but are shown with subnet mask i

Pagina 55

The map-name variable is a string of characters that names the map. Map names can be up to 32characters in length. You can define an unlimited number

Pagina 56

Syntax: ip policy route-map map-nameEnter the name of the route map you want to use for the route-map map-name parameter.Configuration examples for po

Pagina 57

Brocade resourcesVisit the Brocade website to locate related documentation for your product and additional Brocaderesources.You can download additiona

Pagina 58 - RADIUS security

device(config-routemap test-route)#set ip next-hop 192.168.2.1device(config-routemap test-route)#exitThe following commands configure the second entry

Pagina 59 - AAA operations for RADIUS

Trunk formation with PBR policyPBR can be applied on trunk primary port ,only if the port is untagged. When a trunk is formed, the PBRpolicy on the pr

Pagina 60

Trunk formation with PBR policy152 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 61 - Configuring RADIUS

IPv6 ACLs● Supported IPv6 ACL features... 153● IPv6 ACL overview..

Pagina 62

with 4000 entries, two ACLs with 2000 and 2093 entries respectively (combining IPv4 and IPv6 ACLs),etc.An IPv6 ACL is composed of one or more conditio

Pagina 63

• Authentication Header (AHP)• Encapsulating Security Payload (ESP)• Internet Control Message Protocol (ICMP)• Internet Protocol Version 6 (IPv6)• Str

Pagina 64 - RADIUS server per port

To disable IPv6, first remove the ACL from the interface.• For notes on applying IPv6 ACLs to trunk ports, see Applying an IPv6 ACL to a trunk group o

Pagina 65

device(config-if-4/3)# ipv6 traffic-filter netw indevice(config)# write memoryHere is another example.device(config)# ipv6 access-list nextonedevice(c

Pagina 66 - RADIUS parameters

• permit icmp any any nd-na - Allows ICMP neighbor discovery acknowledgements.• permit icmp any any nd-ns - Allows ICMP neighbor discovery solicitatio

Pagina 67 - Setting RADIUS over IPv6

Syntax for creating an IPv6 ACLNOTEThe following features are not supported:• ipv6-operator flow-label• ipv6-operator fragments when any protocol is s

Pagina 68

Document feedbackTo send feedback and report errors in the documentation you can use the feedback form posted withthe document or you can e-mail the d

Pagina 69 - RADIUS authorization

[ 802.1p-priority-matching number ][ dscp-marking number 802.1p-priority-markingnumber internal-priority-marking number ][dscp-marking dscp-value dscp

Pagina 70

Syntax descriptions (Continued)TABLE 13 IPv6 ACLargumentsDescriptionipv6-source-prefix/prefix-lengthThe ipv6-source-prefix/prefix-length parameter s

Pagina 71

Syntax descriptions (Continued)TABLE 13 IPv6 ACLargumentsDescriptiontcp-udp-operator The tcp-udp-operator parameter can be one of the following:• eq

Pagina 72

Syntax descriptions (Continued)TABLE 13 IPv6 ACLargumentsDescription802.1p-priority-marking numberUse the 802.1p-priority-markingnumber parameter to

Pagina 73 - SSL security

• nd-ns• next-header• no-admin• no-route• packet-too-big• parameter-option• parameter-problem• port-unreachable• reassembly-timeout• renum-command• re

Pagina 74

• Gbps Ethernet ports• 10 Gbps Ethernet ports• Trunk groups• Virtual routing interfacesTo apply an IPv6 ACL to an interface, enter commands such as th

Pagina 75 - Authentication-method lists

You can add a comment by entering the remark command immediately preceding an ACL entry, Forexample, to enter comments preceding an ACL entry, enter c

Pagina 76

Configuring IPv6 ACL accountingSteps to enable, display, and clear IPv6 ACL accounting1. To enable IPv6 ACL accounting, use the enable-accounting comm

Pagina 77

Displaying IPv6 ACLsTo display the IPv6 ACLs configured on a device, enter the show ipv6 access-list command. Here isan example.device#show ipv6 acces

Pagina 78

802.1X Port Security● Supported 802.1X port security features...169● IETF RFC supp

Pagina 79

About This Document● What’s new in this document ... 17● How com

Pagina 80

IETF RFC supportBrocade FastIron devices support the IEEE 802.1X standard for authenticating devices attached toLAN ports. Using 802.1X port security,

Pagina 81 - SSH2 and SCP

FIGURE 1 Authenticator, client/supplicant, and authentication server in an 802.1X configurationAuthenticator - The device that controls access to the

Pagina 82 - SSH2 supported features

Communication between the devicesFor communication between the devices, 802.1X port security uses the Extensible AuthenticationProtocol (EAP), defined

Pagina 83 - SSH2 authentication types

FIGURE 3 Controlled and uncontrolled ports before and after client authenticationBefore a Client is authenticated, only the uncontrolled port on the A

Pagina 84

FIGURE 4 Message exchange between client/supplicant, authenticator, and authentication serverIn this example, the Authenticator (the FastIron switch)

Pagina 85

authentication server to protect messages from unauthorized users’ eavesdropping activities. SinceEAP-TLS requires PKI digital certificates on both th

Pagina 86

NOTEIP MTU cannot be configured globally.EAP pass-through supportEAP pass-through is supported on FastIron devices that have 802.1X enabled. EAP pass-

Pagina 87

FIGURE 5 Multiple hosts connected to a single 802.1X-enabled portIf there are multiple hosts connected to a single 802.1X-enabled port, the Brocade de

Pagina 88 - Optional SSH parameters

1. One of the 802.1X-enabled Clients attempts to log into a network in which a Brocade device servesas an Authenticator.2. The Brocade device creates

Pagina 89 - Setting the SSH port number

‐ Configurable hardware aging period for denied client dot1x-mac-sessions. Refer to Configurable hardware aging period for denied client dot1x-mac-ses

Pagina 90 - Displaying SSH information

How command information is presented in this guide18 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 91

period ends, the denied Client's dot1x-mac-session ages out, and the Client can be authenticatedagain.802.1X port security and sFlowsFlow is a st

Pagina 92

‐ Dynamic VLAN assignment for 802.1X port configuration on page 184 (optional)‐ Dynamically applying IP ACLs and MAC address filtersto 802.1X ports on

Pagina 93 - Secure copy with SSH2

The dot1x parameter indicates that this RADIUS server supports the 802.1X standard. A RADIUSserver that supports the 802.1X standard can also be used

Pagina 94

Permit user access to the network after a RADIUS timeoutTo set the RADIUS timeout behavior to bypass 802.1X authentication and permit user access to t

Pagina 95

NOTEThe commands auth-fail-action restrict-vlan and auth-fail-vlanid are supported in the global dot1xmode and are not supported at the port-level. Th

Pagina 96 - SSH2 client

• When the Brocade device receives the value specified for the Tunnel-Private-Group-ID attribute, itchecks whether the vlan-name string matches the na

Pagina 97 - Enabling SSH2 client

In this example, the port is added to VLANs 12 and 20 or VLANs 12 and the VLAN named"marketing". When a tagged packet is authenticated, and

Pagina 98 - Using SSH2 client

• If the port is not already a member of a RADIUS-specified VLAN, and the RADIUS Access-Acceptmessage specifies the name or ID of a valid VLAN on the

Pagina 99

• Concurrent operation of MAC address filters and IP ACLs is not supported.• A dynamic IP ACL will take precedence over an IP ACL that is bound to a p

Pagina 100

Syntax: [no] global-filter-strict-securityTo disable strict security mode for a specific interface, enter commands such as the following.device(config

Pagina 101 - Rule-Based IP ACLs

Security Access● Supported security access features... 19● Securing acces

Pagina 102

Notes for dynamically applying ACLs or MAC address filters• The name in the Filter ID attribute is case-sensitive.• You can specify only numbered MAC

Pagina 103 - ACL overview

Enabling 802.1X port securityBy default, 802.1X port security is disabled on Brocade devices. To enable the feature on the deviceand enter the dot1x c

Pagina 104 - ACL IDs and entries

When an interface control type is set to auto, the controlled port is initially set to unauthorized, but ischanged to authorized when the connecting C

Pagina 105 - Default ACL action

For example, to re-authenticate Clients connected to interface 3/1, enter the following command.device#dot1x re-authenticate e 3/1Syntax: dot1x re-aut

Pagina 106 - How hardware-based ACLs work

You can optionally change the number of times the Brocade device should retransmit the EAP-request/identity frame. You can specify between 1 - 10 fram

Pagina 107

Specifying a timeout for retransmission of messages to theauthentication serverWhen performing authentication, the Brocade device receives EAPOL frame

Pagina 108 - Standard numbered ACL syntax

You can configure the authentication-failure action using one of the following methods:• Configure the same authentication-failure action for all port

Pagina 109 - Standard named ACL syntax

Disabling aging for dot1x-mac-sessionsThe dot1x-mac-sessions for Clients authenticated or denied by a RADIUS server are aged out if notraffic is recei

Pagina 110

You can specify from 1 - 65535 seconds. The default is 120 seconds.Moving native VLAN mac-sessions to restrict VLANYou can move the native VLAN mac-se

Pagina 111

This feature is disabled by default. To enable this feature and change the timeout period, entercommands such as the following.device(config)#dot1x-en

Pagina 112 - Extended numbered ACL syntax

© 2014, Brocade Communications Systems, Inc. All Rights Reserved.Brocade, the B-wing symbol, Brocade Assurance, ADX, AnyIO, DCX, Fabric OS, FastIron,

Pagina 113

NOTEWeb management is not supported in Release 8.0.00a and later releases. If web management isenabled, you must configure the no web-management comma

Pagina 114

802.1X accounting attributes for RADIUS (Continued)TABLE 14 Attribute name Attribute ID Data Type DescriptionAcct-Status-Type 40 integer Indicates w

Pagina 115

Displaying 802.1X configuration informationTo display information about the 802.1X configuration on the Brocade device, enter the show dot1xcommand.de

Pagina 116

Output from the show dot1x command (Continued)TABLE 15 Field Descriptionservertimeout When the Authentication Server does not respond to a message s

Pagina 117

Output from the show dot1x configuration command. (Continued)TABLE 16 Field DescriptionAuthentication-fail-action The configured authentication-fail

Pagina 118 - Extended named ACL syntax

Original PVID : 1Authorized PVID ref count : 2Restricted PVID ref count : 0Radius assign PVID ref count : 0num mac sessio

Pagina 119

Output from the show dot1x config command for an interface (Continued)TABLE 17 Field Descriptionnum mac authorized The number of authorized dot1x-ma

Pagina 120

Output from the show dot1x statistics command (Continued)TABLE 18 Field StatisticsLast EAPOL Source The source MAC address in the last EAPOL frame r

Pagina 121

In this example, the 802.1X-enabled port has been moved from VLAN 1 to VLAN 2. When the clientdisconnects, the port will be moved back to VLAN 1.The s

Pagina 122

Syntax: show dot1x mac-address-filter [ all | ethernet port ]The all keyword displays all dynamically applied MAC address filters active on the device

Pagina 123 - ACL comment text management

Syntax: show dot1x config ethernet portDisplaying 802.1X multiple-host authentication informationYou can display the following information about 802.1

Pagina 124 - Viewing comments in an ACL

Ways to secure management access to Brocade devices (Continued)TABLE 2 Access method How the access method issecured by defaultWays to secure theacc

Pagina 125

Output from the show dot1x mac-session command (Continued)TABLE 19 Field DescriptionPAE State The current status of the Authenticator PAE state mach

Pagina 126 - ACL logging

Point-to-point configurationThe following figure illustrates a sample 802.1X configuration with Clients connected to three ports onthe Brocade device.

Pagina 127

default key mirabeau dot1xdevice(config)#dot1x-enable e 1 to 3device(config-dot1x)#re-authenticationdevice(config-dot1x)#timeout re-authperiod 2000dev

Pagina 128 - Displaying ACL Log Entries

FIGURE 7 Sample 802.1X configuration using a hubSample 802.1x configuration using a hubThe following commands configure the Brocade device in the Samp

Pagina 129

device(config-if-e1000-1)#dot1x port-control autodevice(config-if-e1000-1)#exit802.1X Authentication with dynamic VLAN assignmentThe following figure

Pagina 130

2 is authenticated first, then the PVID for port e2 is changed to VLAN 20. Since a PVID cannot bechanged by RADIUS authentication after it has been dy

Pagina 131

Multi-device port authentication and 802.1Xsecurity on the same port216 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 132 - ACLs to filter ARP packets

MAC Port Security● Supported MAC port security features... 217● MAC port securi

Pagina 133

if the interface then receives a packet with a source MAC address that does not match the learnedaddresses, it is considered a security violation.When

Pagina 134 - Clearing the filter count

Secure MAC movementIf you move a connected device that has MAC address configured as secure on one port to anotherport, the FastIron device connects t

Pagina 135 - QoS options for IP ACLs

Ways to secure management access to Brocade devices (Continued)TABLE 2 Access method How the access method issecured by defaultWays to secure theacc

Pagina 136

For example, to configure interface 7/11 to have a maximum of 10 secure MAC addresses, enter thefollowing commands.device(config)#interface ethernet 7

Pagina 137

On the ICX 7750 device, the port security age can only be set to the global hardware age. The absoluteage and no age secure MACs are configured as sta

Pagina 138

For example, to automatically save learned secure MAC addresses every 20 minutes, enter thefollowing commands.device(config)#port securitydevice(confi

Pagina 139

Aging for restricted MAC addresses is done in software. There can be a worst case inaccuracy of oneminute from the specified time.The restricted MAC a

Pagina 140 - ACL statistics

Displaying port security informationYou can display the following information about the MAC port security feature:• The port security settings for an

Pagina 141 - ACL accounting

Output from the show port security mac command TABLE 22 Field DescriptionPort The slot and port number of the interface.Num-Addr The number of MAC a

Pagina 142

For example, to display port security statistics for interface module 7, enter the show port securitystatistics command.device#show port security stat

Pagina 143 - Displaying ACL information

MAC-based VLANs● Supported MAC-based VLAN features... 227● MAC-based VLAN overvi

Pagina 144 - Policy-based routing (PBR)

from the new MAC address will be blocked or dropped until the authentication succeeds. Traffic isdropped if the authentication fails.Static and dynami

Pagina 145 - Configuring the ACLs

NOTEEven though the feature supports up tp a maximum of 32 MAC address per physical port, theconfiguration of the maximum number of MAC addresses per

Pagina 146

Remote access to management function restrictionsYou can restrict access to management functions from remote sources, including Telnet and SNMP.The fo

Pagina 147 - Configuring the route map

CLI commands for MAC-based VLANs TABLE 25 CLI command Description CLI levelmac-auth mac-vlan enable Enables per-port MAC-based VLAN Interfacemac-aut

Pagina 148 - Enabling PBR

vlan 222 name RESTRICTED_MBV by portuntagged ethe 0/1/4mac-vlan-permit ethe 0/1/1 to 0/1/3vlan 666 name RESTRICTED_MAC_AUTH by portuntagged ethe 0/1/2

Pagina 149 - Setting the next hop

NOTEMAC-based VLAN is not supported on trunk or LACP ports. Do not configure trunks on MAC-basedVLAN-enabled ports.Using MAC-based VLANs and 802.1X se

Pagina 150

Brocade vendor-specific attributes for RADIUS TABLE 27 Attribute name Attribute ID Data type OptionalormandatoryDescriptionFoundry-MAC-basedVLAN-QoS

Pagina 151

For blocked hostsFor blocked hosts, as long as the Brocade device is receiving traffic, aging does not occur. In theoutput of the show table-mac-vlan

Pagina 152

Enter the command at the global or interface configuration level.The denied-mac-only parameter prevents denied sessions from being aged out, but ages

Pagina 153 - IPv6 ACLs

4. To enable MAC-based VLAN on the port.device(config)#interface e 0/1/1device(config-if-e1000-0/1/1)#mac-authentication mac-vlan enable5. To disable

Pagina 154

NOTEIf static Mac-Based VLAN is configured on a port, the port will be added only to the VLAN table forwhich the static MAC-based VLAN configuration e

Pagina 155 - IPv6 ACL configuration notes

Field DescriptionStatic Macs The number of currently connected active static hosts.Static Conf The number of static hosts that are configured on the p

Pagina 156 - Configuring an IPv6 ACL

-------------------------------------------------------------------------------MAC Address Port Vlan Authenticated Time Age dot1x------

Pagina 157

To configure a more restrictive ACL, create permit entries and omit the permit any entry at the end ofthe ACL.device(config)#access-list 10 permit hos

Pagina 158 - Creating an IPv6 ACL

Field DescriptionAuthenticated No indicates that authentication has failed.Inp indicates that authentication is in progress.Time The time at which aut

Pagina 159 - For ICMP

Displaying MAC-VLAN information for a specific interfaceEnter the show table-mac-vlan e command to display MAC-VLAN information for a specific interfa

Pagina 160

Field DescriptionPri This field indicates the value set for Foundry-MAC-based VLAN-QoS attribute in the RADIUSconfiguration for dynamic hosts, if conf

Pagina 161

0d18h46m28s:I:running-config was changed from console0d02h12m25s:A:MAC Based Vlan Mapping failed for [0000.0011.0108 ] on port 0/2/1(Invalid User)0d02

Pagina 162

FIGURE 9 Sample MAC-based VLAN configurationHost A MAC address is statically mapped to VLAN 1 with priority 1 and is not subjected to RADIUSauthentica

Pagina 163 - ICMP message configurations

radius-server host 10.44.3.111radius-server key 1 $-ndUnomac-authentication enablemac-authentication max-age 60mac-authentication hw-deny-age 30mac-au

Pagina 164

Sample MAC-based VLAN application246 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 165

Defining MAC Address Filters● Supported MAC address filter features... 247● MAC

Pagina 166 - Support for ACL logging

MAC address filters command syntaxTo configure and apply a MAC address filter, enter commands such as the following.device(config)# mac filter 1 deny

Pagina 167

NOTEYou cannot add or remove individual filters in the group. To add or remove a filter on an interface, applythe filter group again containing all th

Pagina 168 - Displaying IPv6 ACLs

The ro parameter indicates that the community string is for read-only ("get") access. The rw parameterindicates the community string is for

Pagina 169 - 802.1X Port Security

MAC address filter logging command syntaxTo configure MAC address filter logging globally, enter the following CLI commands at the globalCONFIG level.

Pagina 170 - IETF RFC support

MAC address filter override for 802.1X-enabled portsThe MAC address filtering feature on an 802.1X-enabled port allows 802.1X and non-802.1X devices t

Pagina 171

The filter-num command identifies the MAC address filter. The maximum number of supported MACaddress filters is determined by the mac-filter-sys defau

Pagina 172

Multi-Device Port Authentication● Supported Multi-device port authentication (MDPA) features... 253● How multi-dev

Pagina 173

Feature ICX 6430 ICX 6450 FCX ICX 6610 ICX 6650 FSX 800FSX 1600ICX 7750Multi-Device Port Authentication 08.0.01 08.0.01 08.0.01 08.0.01 08.0.01 08.0.0

Pagina 174

the device to move the port on which the non-authenticated MAC address was learned into a restrictedor "guest" VLAN, which may have limited

Pagina 175 - Setting the IP MTU size

• Vendor-Specific (26) - RFC 2865• Session-Timeout (27) - RFC 2865• Termination-Action (29) - RFC 2865• Calling-Station-ID (31) - RFC 2865• NAS-Identi

Pagina 176 - EAP pass-through support

Support for DHCP snooping with dynamic ACLsNOTEThis feature is not supported on FCX devices.Multi-device port authentication and DHCP snooping are sup

Pagina 177

If multi-device port authentication fails for a device, then by default traffic from the device is eitherblocked in hardware, or the device is placed

Pagina 178

Multi-device port authentication configurationConfiguring multi-device port authentication on the Brocade device consists of the following tasks:• Ena

Pagina 179

Restricting Telnet access to a specific IP addressTo allow Telnet access to the Brocade device only to the host with IP address 10.157.22.39, enter th

Pagina 180 - 802.1X accounting

device(config)#int e 3/1 to 3/12device(config-mif-3/1-3/12)#mac-authentication enableSpecifying the format of the MAC addresses sent to theRADIUS serv

Pagina 181 - Setting RADIUS parameters

Syntax: [no] mac-authentication auth-fail-action block-trafficDropping traffic from non-authenticated MAC addresses is the default behavior when multi

Pagina 182 - Supported RADIUS attributes

To enable dynamic VLAN assignment for authenticated MAC addresses, you must add attributes tothe profile for the MAC address on the RADIUS server, the

Pagina 183 - Re-authenticate a user

Configuring the RADIUS server to support dynamic VLAN assignmentTo specify VLAN identifiers on the RADIUS server, add the following attributes to the

Pagina 184

• Enabling dynamic VLAN support for tagged packets on non-member VLAN ports is not supportedon FWS and FCX devices.• The mac-authentication disable-in

Pagina 185 - Specifying a tagged VLAN

displayed, although they can be displayed with the show vlan , show auth-mac-addresses detail ,and show auth-mac-addresses authorized-mac commands.You

Pagina 186

Support is automatically enabled when all of the required conditions are met.The following describes the conditions and feature limitations:• On Layer

Pagina 187

configure the Filter-ID (type 11) attribute on the RADIUS server. The Filter-ID attribute specifies thename or number of the Brocade IP ACL.The follow

Pagina 188 - Disabled strict security mode

To specify a maximum rate for RADIUS authentication attempts, enter commands such as thefollowing.device(config)#interface e 3/1device(config-if-e1000

Pagina 189

NOTESource guard protection is supported only on the router image and not on the switch image.Viewing the assigned ACL for ports on which source guard

Pagina 190

The following command allows Telnet access to the Brocade device to a host with any IP address andMAC address 0000.000f.e9a0.device(config)#telnet cli

Pagina 191 - Setting the port control

Disabling aging for authenticated MAC addressesMAC addresses that have been authenticated or denied by a RADIUS server are aged out if no trafficis re

Pagina 192

configurable through the CLI, with the mac-authentication max-age command. Once the hardwareaging period ends, the software aging period begins. When

Pagina 193 - Setting the quiet period

process and blocks user access to the network, unless restrict-vlan is configured, in which case, theuser is placed into a VLAN with restricted or lim

Pagina 194

the request sent to the RADIUS server. For example, given a MAC address of 0000000feaa1, the usersfile on the RADIUS server would be configured with a

Pagina 195 - Initializing 802.1X on a port

1/22 100 0 0 04/5 30 0 0 0Syntax: show auth-mac-addressT

Pagina 196

Output from theshow authenticated-mac-address configuration command (Continued)TABLE 30 Field DescriptionDyn-vlan Whether RADIUS dynamic VLAN assign

Pagina 197

Output from the show authenticated-mac-address address command (Continued)TABLE 31 Field DescriptionCAM Index If the MAC address is blocked, this is

Pagina 198

0000.0000.0321 18/1 87 No 00d01h03m17s H52 Ena0000.0000.0259 18/1 87 No 00d01h03m17s H52 Ena0000.0000.0065 18/1 87 Yes

Pagina 199

Authentication attempts : 0 RADIUS timeouts : 0 RADIUS timeouts action : Success MAC Address on PVID

Pagina 200 - Displaying 802.1X information

Output from the show auth-mac-addresses detailed command (Continued)TABLE 33 Field DescriptionAccepted Mac Addresses The number of MAC addresses tha

Pagina 201 - Syntax: show dot1x

NOTEYou need to configure telnet with the enable telnet authentication local command to enable only acertain number of telnet login attempts.Changing

Pagina 202

Output from the show auth-mac-addresses detailed command (Continued)TABLE 33 Field DescriptionRADIUS Server The IP address of the RADIUS server used

Pagina 203

To display the table of allowed mac addresses enter the show table denied-mac command as shown.Syntax: show table mac addressThe mac address variable

Pagina 204

FIGURE 10 Using multi-device port authentication with dynamic VLAN assignmentIn this example, multi-device port authentication is performed for both d

Pagina 205 - Displaying 802.1X statistics

mac-authentication auth-fail-action restrict-vlan mac-authentication enable-dynamic-vlan mac-authentication disable-ingress-filteringThe mac-authenti

Pagina 206 - Clearing 802.1X statistics

FIGURE 11 Using multi-device port authentication with dynamic VLAN assignmentIn this example, multi-device port authentication is performed for both d

Pagina 207

VLAN, authentication would not occur. In this case, port e1 must be added to that VLAN prior toauthentication.The part of the running-config related t

Pagina 208

FIGURE 12 Using multi-device port authentication and 802.1X authentication on the same portWhen the devices attempt to connect to the network, they ar

Pagina 209

that the PVID for User 1 port be changed to the VLAN named "User-VLAN", which is VLAN 3. If 802.1Xauthentication for User 1 is unsuccessful,

Pagina 210 - Sample 802.1X configurations

FIGURE 13 802.1X Authentication is performed when a device fails multi-device port authenticationMulti-device port authentication is initially perform

Pagina 211 - Point-to-point configuration

To configure the device to perform 802.1X authentication when a device fails multi-device portauthentication, enter the following command.device(confi

Pagina 212 - Hub configuration

The command in this example configures the device to allow SNMP access only to clients connected toports within port-based VLAN 40. Clients connected

Pagina 213

Example 2 -- Creating a profile on the RADIUS server for each MAC address290 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 214

Web Authentication● Supported Web Authentication features... 291● Web authenticati

Pagina 215

The Brocade Web authentication method provides an ideal port-based authentication alternative tomulti-device port authentication without the complexit

Pagina 216

• If you are using DHCP addressing, a DHCP server must be in the same broadcast domain as thehost. This DHCP server does not have to be physically con

Pagina 217 - MAC Port Security

Web authentication configuration tasksFollow the steps given below to configure Web Authentication on a device.1. Set up any global configuration requ

Pagina 218

5. Create a Web Authentication VLAN and enable Web Authentication on that VLAN.device(config)#vlan 10device(config-vlan-10)#webauthdevice(config-vlan-

Pagina 219 - Secure MAC movement

Using local user databasesWeb Authentication supports the use of local user databases consisting of usernames and passwords,to authenticate devices. U

Pagina 220

Syntax: username username password passwordFor username , enter up to 31 ASCII characters.For username , enter up to 29 ASCII characters.You can add u

Pagina 221 - On a tagged interface

For password1 , password2 , etc., enter up to 29 ASCII characters.Be sure to Insert a cursor return (cr ) after each user record.You can enter up to 3

Pagina 222

To revert back to using the RADIUS server, enter the following command.device(config-vlan-10-webauth)# auth-mode username-password auth-methods radius

Pagina 224

The metric parameter specifies the metric (cost) of the gateway. You can specify a value from 1 - 5.There is no default. The software uses the gateway

Pagina 225

Creating static passcodesStatic passcodes can be used for troubleshooting purposes, or for networks that want to use passcodeauthentication, but do no

Pagina 226

• Duration of time - By default, dynamically-created passcodes are refreshed every 1440 minutes (24hours). When refreshed, a new passcode is generated

Pagina 227 - MAC-based VLANs

hh:mm is the hour and minutes. If you do not enter a value for hh:mm , by default, passcodes will berefreshed at 00:00 (12:00 midnight). You can confi

Pagina 228 - Static and dynamic hosts

The following shows an example Syslog message and SNMP trap message related to passcodeauthentication.New passcode: 01234567. Expires in 1440 minutes.

Pagina 229 - Dynamic MAC-based VLAN

Automatic authenticationBy default, if Web Authentication is enabled, hosts need to login and enter authentication credentialsin order to gain access

Pagina 230

Syntax: [no] accountingEnter the no accounting command to disable RADIUS accounting for Web Authentication.Changing the login mode (HTTPS or HTTP)Web

Pagina 231 - MAC-based VLAN configuration

Entering a no add mac mac-addressdurationseconds|ethernetportdurationseconds command setsduration and ethernet to their default values. If you want to

Pagina 232 - RADIUS server

Clearing authenticated hosts from the webauthentication tableUse the following commands to clear dynamically-authenticated hosts from the Web Authenti

Pagina 233 - Aging for MAC-based VLAN

Limiting the number of authenticated hostsYou can limit the number of hosts that are authenticated at any one time by entering a command suchas the fo

Pagina 234 - Globally disabling aging

Forcing re-authentication after an inactive periodYou can force Web Authenticated hosts to be re-authenticated if they have been inactive for a period

Pagina 235

Disabling Telnet accessYou can use a Telnet client to access the CLI on the device over the network. If you do not plan to usethe CLI over the network

Pagina 236

Deleting a web authentication VLANTo delete a Web Authentication VLAN, enter the following commands:device(config)# vlan 10device(config-vlan-10)# no

Pagina 237 - Displaying the MAC-VLAN table

FIGURE 16 Example of a login page when automatic authentication is disabled and passcodeAuthentication is EnabledThe user enters a passcode, which is

Pagina 238

FIGURE 18 Example of a maximum Host limit pageIf the number of Web Authentication attempts by a user has been exceeded, the Maximum AttemptsLimit page

Pagina 239

FIGURE 20 Example of a web authentication success pageOnce a host is authenticated, that host can manually de-authenticate by clicking the Logout butt

Pagina 240

Displaying text for web authentication pagesUse the show webauth vlan vlan-ID webpage command to determine what text has been configuredfor Web Authen

Pagina 241

FIGURE 21 Objects in the web authentication pages that can be customizedCustomizing the title barYou can customize the title bar that appears on all W

Pagina 242

The filename parameter specifies the name of the image file on the TFTP server.Use the no webpage logo command to delete the logo from all Web Authent

Pagina 243 - Clearing MAC-VLAN information

Customizing the login buttonYou can customize the Login button that appears on the bottom of the Web Authentication Login page.To do so, enter a comma

Pagina 244

Bottom (Footer): Custom Text "SNL Copyright 2009" Title: Default Text Login Button: Custom Text "Sign On" Web

Pagina 245

Field DescriptionWeb Page Customizations The current configuration for the text that appears on the Web Authenticationpages. Either "Custom Text&

Pagina 246

NOTEYou also can configure up to 16 user accounts consisting of a user name and password, and assigneach user account a management privilege level. Re

Pagina 247 - Defining MAC Address Filters

Displaying a list of hosts attempting to authenticateEnter the show webauth authenticating-list command to display a list of hosts that are trying toa

Pagina 248

Field DescriptionUser Name The User Name associated with the MAC address.Configuration Static/Dynamic If the MAC address was dynamically or statically

Pagina 249

Displaying passcodes322 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 250

DoS Attack Protection● Supported DoS protection features...323● Smurf atta

Pagina 251

FIGURE 22 How a Smurf attack floods a victim with ICMP repliesThe attacker sends an ICMP echo request packet to the broadcast address of an intermedia

Pagina 252

For example, to set threshold values for ICMP packets targeted at the router, enter the followingcommand in global CONFIG mode.device(config)#ip icmp

Pagina 253

• If the number of ICMP packets exceeds the burst-normal value, the excess ICMP packets aredropped.• If the number of ICMP packets exceeds the burst-m

Pagina 254

NOTEFor ICX 7750 devices, the "attack rate" parameter is only applicable for smurf attacks and not forTCP/SYN attacks.To set threshold value

Pagina 255 - Unauthenticated port behavior

Protecting against a blind TCP reset attack using the RST bitIn a blind TCP reset attack using the RST bit, a perpetrator attempts to guess the RST bi

Pagina 256 - Support for dynamic ACLs

Syntax: clear statistics dos-attackDoS Attack ProtectionFastIron Ethernet Switch Security Configuration Guide 32953-1003088-03

Pagina 257

on the order you specify in the authentication-method lists. Refer to Authentication-method lists on page75.Follow the steps given below to set passwo

Pagina 258

Displaying statistics about packets dropped because of DoS attacks330 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 259

DHCP● Supported DHCP packet inspection and tracking features... 331● Dynamic ARP inspection ...

Pagina 260

mapping. All computers on the subnet will receive and process the ARP requests, and the host whoseIP address matches the IP address in the request wil

Pagina 261 - Defining MAC address filters

FIGURE 23 Dynamic ARP inspection at workARP entriesDAI uses the IP/MAC mappings in the ARP table to validate ARP packets received on untrusted ports.A

Pagina 262

NOTEYou must save the configuration and reload the software to place the change into effect.• Brocade does not support DAI on trunk or LAG ports.• The

Pagina 263

The ARP entry will be in Pend (pending) status until traffic with the matching IP-to-MAC is received on aport.Syntax: [no] arp ip-addr mac-addr inspec

Pagina 264

2 10.43.1.78 0000.0060.6ab1 Dynamic 2 mgmt1 ValidThe command displays all ARP entries i

Pagina 265

other users. DHCP snooping can also stop unauthorized DHCP servers and prevent errors due to usermis-configuration of DHCP servers.Often DHCP snooping

Pagina 266

The lease time will be refreshed when the client renews its IP address with the DHCP server;otherwise the Brocade device removes the entry when the le

Pagina 267

Configuring DHCP snoopingConfiguring DHCP snooping consists of the following steps.1. Enable DHCP snooping on a VLAN.Refer to Enabling DHCP snooping o

Pagina 268

Enhance the Port Configuration privilege level so users also can enter IP commands at the globalCONFIG level.device(config)#privilege configure level

Pagina 269

Clearing the DHCP binding databaseYou can clear the DHCP binding database using the CLI command clear DHCP . You can remove allentries in the database

Pagina 270

DHCP snooping configuration exampleThe following example configures VLAN 2 and VLAN 20, and changes the CLI to the globalconfiguration level to enable

Pagina 271

Syntax: enable acl-per-port-per-vlan• Configure DHCP IPv4 snooping on a specific VLAN using ip dhcp snooping vlan vlan-id . Forexample:Brocade(config)

Pagina 272

• Before relaying a DHCP discovery packet or DHCP request packet from a client to a DHCP server,the FastIron switch will add agent information to the

Pagina 273

DHCP Option 82 sub-optionsThe Brocade implementation of DHCP Option 82 supports the following sub-options:• Sub-Option 1 - Circuit ID• Sub-Option 2 -

Pagina 274

The following figure illustrates the SID packet format.FIGURE 30 SID packet formatThe second byte (N in the figure) is the length of the ASCII string

Pagina 275 - MAC address or port

To re-enable DHCP option 82 on an interface after it has been disabled, enter the following commandat the Interface level of the CLI.device(config-if-

Pagina 276

Use the show interfaces ethernet command to view the subscriber ID configured on a port.Refer to Viewing the status of DHCP option 82 and the subscrib

Pagina 277 - MAC addresses

Output for the show ip dhcp snooping vlan commandTABLE 35 Field DescriptionIP DHCP snooping VLAN vlan-id The DHCP snooping and DHCP option 82 status

Pagina 278

Configuring the source IP address of a DHCP-client packet on the DHCPrelay agentEnables the DHCP server to know the source subnet or network of a DHCP

Pagina 279

1. Start a CLI session over the serial interface to the device.2. Reboot the device.3. At the initial boot prompt at system startup, enter b to enter

Pagina 280

NOTEYou must save the configuration and reload the software to place the change into effect.• Brocade FCX devices do not support IP Source Guard and d

Pagina 281

Enabling IP source guard on a portYou can enable IP Source Guard on DHCP snooping untrusted ports. Refer to DHCP snooping on page336 for how to config

Pagina 282

device(config-vlan-2)#tag e1Added tagged port(s) ethe 1 to port-vlan 2device(config-vlan-2)#router-int ve 2device(config-vlan-2)#int ve 2device(config

Pagina 283

for FWS, FCX, and ICX stackable switches.Syntax: show ip source-guard ethernet slotnum/portnumfor FSX, 800, and FSX 1600 chassis devices.DHCPFastIron

Pagina 284

Displaying learned IP addresses354 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 285

DHCPv6● Supported DHCPv6 packet inspection and tracking features... 355● Securing IPv6 address configuration...

Pagina 286

How DHCPv6 snooping worksWhen enabled on a VLAN, DHCPv6 snooping stands between untrusted ports (those connected tohost ports) and trusted ports (thos

Pagina 287

Configuration notes and feature limitations for DHCPv6 snoopingThe following limits and restrictions apply to DHCPv6 snooping:• To run DHCPv6 snooping

Pagina 288

Enabling trust on a port connected to a DHCPv6 serverThe default trust setting for a port is untrusted. To enable trust on a port connected to a DHCPv

Pagina 289

Syntax: show ipv6 dhcp6 snooping vlan vlan-idDisplaying the DHCPv6 snooping binding databaseTo see DHCPv6 snooping binding database, enter the show ip

Pagina 290

If you configure local user accounts, you also need to configure an authentication-method list forTelnet access and SNMP access. Refer to Authenticati

Pagina 291 - Web Authentication

Syntax: enable acl-per-port-per-vlan• Configure DHCPv6 snooping on a specific VLAN using ipv6 dhcp6 snooping vlan vlan-id. Forexample:Brocade(config)#

Pagina 292

IPv6 RA Guard● Supported platforms for the IPv6 RA guard feature... 361● Securing IPv6 address conf

Pagina 293

link. This helps the nodes to autoconfigure themselves on the network. Unintended misconfigurationsor malicious attacks on the network lead to false R

Pagina 294

the VLAN the ports are a part of. By default, all interfaces are configured as host ports. On a host port,all the RAs are dropped with a policy config

Pagina 295

10.(Optional) Clear the RA packet counter using the clear ipv6 raguard command.11.(Optional) Verify the RA packet counts using the show ipv6 raguard c

Pagina 296 - Using local user databases

FIGURE 33 IPv6 RA guard configuration in a networkConfiguring port A:Configure port A as a trusted port.Brocade(config)# interface ethernet 1/1/1Broca

Pagina 297

Brocade(config)# prefix-list raguard-prefix-list1 permit 2001:db8::/16Brocade(config)# ipv6 raguard policy policyBBrocade(ipv6-RAG-policy policyB)# wh

Pagina 298

Security Commands● access-list enable accounting... 368● clear acc

Pagina 299

access-list enable accountingConfigures ACL accounting.Enables ACL accounting for IPv4 numbered ACLs.The no form disables ACL accounting for IPv4 numb

Pagina 300 - Creating static passcodes

clear access-list accountingClears ACL accounting statistics.Clears ACL accounting statistics for IPv4 ACLs, IPv6 ACLs, and Layer 2 MAC filters.Syntax

Pagina 301

NOTEPassword minimum and combination requirements are strictly enforced.Use the enable strict-password-enforcement command to enable the password secu

Pagina 302

ModesGlobal configurationUsage GuidelinesTo clear RA guard packet counters for all RA guard policies, use the all keyword. To clear the RA guardpacket

Pagina 303

enable-accountingConfigures ACL accountingEnables ACL accounting for IPv4 and IPv6 named ACLs.The no form disables ACL accounting for IPv4 and IPv6 na

Pagina 304 - Automatic authentication

RA packets drop due to congestion if they are received at the line rate. For less load on the CPU,logging can be disabled on the RA guard policy.Examp

Pagina 305 - Specifying trusted ports

Usage GuidelinesYou can associate only one RA guard policy with a VLAN. If you associate a new RA guard policy witha VLAN that already has a policy co

Pagina 306

mac filter enable-accountingConfigures ACL accounting for MAC filters.Enables ACL accounting on Layer 2 MAC filters.The no form disables ACL accountin

Pagina 307

Allows RAs of low and medium router preference.ModesRA guard policy configurationUsage GuidelinesIf a very low value is set, then the RAs expected to

Pagina 308 - Filtering DNS queries

Configures an interface as a trusted RA guard port.untrustConfigures an interface as an untrusted RA guard port.hostConfigures an interface as a host

Pagina 309

show access-list accountingDisplays ACL accounting statisticsDisplays ACL accounting statistics for IPv4 ACLs, IPv6 ACLs, and Layer 2 MAC filters.Synt

Pagina 310 - Web authentication pages

ExamplesThe output displayed will give information about IPv4 ACLs or IPv6 ACLs, or MAC filters based on theconfiguration of the port or interface. If

Pagina 311

The following sample output from the FastIron SX device shows the per-port display when the devicehas "acl-per-port-per-vlan" configured for

Pagina 312

To enable password masking, enter the following command.device(config)#enable user password-maskingSyntax: [no] enable user password-maskingEnabling u

Pagina 313

Hit Count: (1Min) N/A (5Sec) N/A (PktCnt) N/A (ByteCnt) 0 -------------------

Pagina 314

Displays the permit or drop counts for the specified RA guard policy.allDisplays the permit or drop counts for all RA guard policies.ModesGlobal confi

Pagina 315 - Customizing the title bar

ip bootp-use-intf-ipConfigures the source IP address of a DHCP-client packet in a DHCP relay agent.Configures a DHCP relay agent to set the source IP

Pagina 316 - Customizing the text box

The no form of this command removes the associated RA guard whitelist from the RA guard policy.When a whitelist associated with an RA guard policy is

Pagina 317 - Customizing the footer

whitelist384 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 318

Index802.1x port securityaccounting 180accounting attributes for RADIUS802.1x port securityFastIron Ethernet Switch Security Configuration Guide 38553

Pagina 319

enabling accounting 199accounting configuration 199allowing access to multiple hosts 195and sFlow 180applying IP ACLs and MAC address filters 187authe

Pagina 320

accounting, pre-requisites for ACL accounting 141adding a comment to an entry 124adding a comment to an IPv6 entry 165applying an IPv4 ACL to a subset

Pagina 321 - Displaying passcodes

TCP flags 76aaa authorization commands 70aaa authorization commands < 55access-list 108, 112, 123, 137, 145accounting 304ACL-logging 127age 220all-

Pagina 322

auth-fail-action restricted-vlan 195auth-fail-action restrict-vlan 195auth-fail-max-attempts 195auth-fail-vlanid 195auth-max 193dot1x disable-filter-s

Pagina 323 - DoS Attack Protection

Enhanced login lockoutThe CLI provides up to three login attempts. If a user fails to login after three attempts, that user islocked out (disabled). I

Pagina 324

age 220arp inspection trust 335dhcp snooping relay information 345dhcp snooping relay information option subscriber-id 346dot1x auth-filter 251dot1x a

Pagina 325

aging 233and port up or down events 229clearing information 243configuration 231configuring for a dynamic host 236configuring for a static host 235con

Pagina 326 - TCP SYN attacks

changing a local user password 41configuring 36configuring password history 38enabling user password aging 38enabling user password masking 37enhanced

Pagina 327 - TCP security enhancement

configuring challenge-response authentication 86enabling challenge-response 87exporting client public keys 98generating a client key pair 98generating

Pagina 328

SSH2DSA challenge-response authentication 83password authenticationSSH2configuration 83RSA challenge-response authentication 83use with secure copy 93

Pagina 329

auth-mode passcode static 300auth-mode username-password auth-methods 299auth-mode username-password auth-methodslocal 298auth-mode username-password

Pagina 330

396 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 331 - Dynamic ARP inspection

Setting optional TACACS and TACACS+ parameters...49Configuring authentication-method lists forTACACS andTACACS+...

Pagina 332 - About Dynamic ARP Inspection

Local user account configurationYou can create accounts for local users with or without passwords. Accounts with passwords can haveencrypted or unencr

Pagina 333 - ARP entries

The password | nopassword parameter indicates whether the user must enter a password. If youspecify password , enter the string for the user's pa

Pagina 334

TACACS and TACACS+ securityYou can use the security protocol Terminal Access Controller Access Control System (TACACS) orTACACS+ to authenticate the f

Pagina 335 - Displaying the ARP table

Configuring TACACS/TACACS+ for devices in a Brocade traditional stackBecausedevices operating in a Brocade traditional stack topology present multiple

Pagina 336 - DHCP snooping

you are connecting to this session 1 minutes 5 seconds in idle 2 established 1 hours 4 minutes 18 seconds in idle 3 es

Pagina 337 - How DHCP snooping works

TACACS+ authorizationBrocade devices support two kinds of TACACS+ authorization:• Exec authorization determines a user privilege level when they are a

Pagina 338

User action Applicable AAA operationsSystem accounting start (TACACS+):aaa accounting system default start-stop method-listUser logs in using Telnet/S

Pagina 339 - Configuring DHCP snooping

AAA security for commands pasted into the running-configIf AAA security is enabled on the device, commands pasted into the running-config are subject

Pagina 340

Enabling TACACSTACACS is disabled by default. To configure TACACS/TACACS+ authentication parameters, youmust enable TACACS by entering the following c

Pagina 341 - Multi-VRF support

The auth-port parameter specifies the UDP (for TACACS) or TCP (for TACACS+) port number ofthe authentication port on the server. The default port numb

Pagina 342 - DHCP relay agent information

Filtering SSH access using ACLs... 90Terminating an active SSH connection...

Pagina 343

To specify a TACACS+ server key, enter a command such as following.device(config)#tacacs-server key rkwongSyntax: tacacs-server key [ 0 ] stringWhen y

Pagina 344 - DHCP Option 82 sub-options

When you configure authentication-method lists for TACACS/TACACS+ authentication, you must createa separate authentication-method list for Telnet/SSH

Pagina 345 - DHCP option 82 configuration

Authentication method values (Continued)TABLE 3 Method parameter Descriptionnone Do not use any authentication method. The device automatically perm

Pagina 346

Configuring TACACS+ authorizationBrocade devices support TACACS+ authorization for controlling access to management functions in theCLI. Two kinds of

Pagina 347

are 0 for super-user level, 4 for port-config level, or 5 for read-only level. If a value other than 0, 4, or 5is specified in the foundry-privlvl A-V

Pagina 348

Configuring command authorizationWhen TACACS+ command authorization is enabled, the Brocade device consults a TACACS+ serverto get authorization for c

Pagina 349 - IP source guard

Configuring TACACS+ accounting for Telnet/SSH (Shell) accessTo send an Accounting Start packet to the TACACS+ accounting server when an authenticated

Pagina 350

Switch. For configuration details, see "Specifying a single source interface for specified packet types"section in the FastIron Ethernet Swi

Pagina 351

RADIUS securityYou can use a Remote Authentication Dial In User Service (RADIUS) server to secure the followingtypes of access to the Brocade Layer 2

Pagina 352

3. If the command belongs to a privilege level that requires authorization, the Brocade device looks atthe list of commands delivered to it in the RAD

Pagina 353

Applying an IPv4 ACL to a subset of ports on a virtual interface(Layer 3 devices only)...

Pagina 354

User action Applicable AAA operationsEXEC accounting Start:aaa accounting exec default start-stop method-listSystem accounting Start:aaa accounting sy

Pagina 355 - DHCPv6 snooping

AAA operations are performed before the commands are actually added to the running-config. Theserver performing the AAA operations should be reachable

Pagina 356 - How DHCPv6 snooping works

8. Optionally configure RADIUS authorization. Refer to RADIUS authorization on page 69.9. Optionally configure RADIUS accounting. Refer to RADIUS acco

Pagina 357 - Configuring DHCPv6 snooping

Brocade vendor-specific attributes for RADIUS (Continued)TABLE 6 Attribute name Attribute ID Data type Descriptionfoundry-command-exception-flag3 in

Pagina 358

The config-radius parameter specifies the RADIUS configuration mode. RADIUS is disabled bydefault.The config-tacacs parameter specifies the TACACS con

Pagina 359

RADIUS server per port configuration notes• This feature works with 802.1X and multi-device port authentication only.• You can define up to eight RADI

Pagina 360

RADIUS server-to-ports configuration notes• This feature works with 802.1X and multi-device port authentication only.• You can map a RADIUS server to

Pagina 361 - IPv6 RA Guard

NOTEEncryption of the RADIUS keys is done by default and the default value is 2( SIMPLE_ENCRYPTION_BASE64). The 0 parameter disables encryption. The 1

Pagina 362 - Maximum preference

When you configure authentication-method lists for RADIUS, you must create a separateauthentication-method list for Telnet or SSH CLI access and for C

Pagina 363 - Configuring IPv6 RA guard

Authentication method values (Continued)TABLE 7 Method parameter Descriptionnone Do not use any authentication method. The device automatically perm

Pagina 364

802.1X Port Security...169Supported 802.1X p

Pagina 365 - Configuring port B:

Syntax: aaa authorization exec default [ radius | none ]If you specify none , or omit the aaa authorization exec command from the device configuration

Pagina 366

Command authorization and accounting for console commandsThe Brocade device supports command authorization and command accounting for CLI commandsente

Pagina 367 - Security Commands

NOTEIf authorization is enabled, and the command requires authorization, then authorization is performedbefore accounting takes place. If authorizatio

Pagina 368

Output of the show aaa command for RADIUS TABLE 8 Field DescriptionRadius key The setting configured with the radius-server key command. At the Supe

Pagina 369

Changing the SSL server certificate key sizeThe default key size for Brocade-issued and imported digital certificates is 1024 bits. If desired, youcan

Pagina 370

Generating an SSL certificateIf the certificate does not automatically generate, enter the following command togenerate it.Brocade(config)#crypto-ssl

Pagina 371

In an authentication-method list for a particular access method, you can specify up to sevenauthentication methods. If the first authentication method

Pagina 372

Note that the above configuration can be overridden by the command no snmp-server pw-check ,which disables password checking for SNMP SET requests.Exa

Pagina 373

Authentication method values (Continued)TABLE 9 Method parameter Descriptionlocal Authenticate using a local user name and password you configured o

Pagina 374

Using TCP Flags in combination with other ACL featuresThe TCP Flags feature has the added capability of being combined with other ACL features.device(

Pagina 375

MAC port security configuration...219Enabling the MAC port security feature...

Pagina 376

Using TCP Flags in combination with other ACL features80 FastIron Ethernet Switch Security Configuration Guide53-1003088-03

Pagina 377

SSH2 and SCP● Supported SSH2 and Secure Copy features... 81● SSH version 2 overview...

Pagina 378

used. The highest version of SSH2 supported by both the Brocade device and the client is the versionthat is used for the session. Once the SSH2 versio

Pagina 379

• Encryption is provided with 3des-cbc , aes128-cbc , aes192-cbc or aes256-cbc . AES encryptionhas been adopted by the U.S. Government as an encryptio

Pagina 380

Enabling and disabling SSH by generating and deleting host keysTo enable SSH, you generate a DSA or RSA host key on the device. The SSH server on the

Pagina 381

Generating and deleting an RSA key pairTo generate an RSA key pair, enter a command such as the following:device(config)#crypto key generate rsa modul

Pagina 382

Configuring DSA or RSA challenge-response authenticationWith DSA or RSA challenge-response authentication, a collection of clients’ public keys are st

Pagina 383

The tftp-server-ip-addr variable is the IP address of the tftp server that contains the public key file thatyou want to import into the Brocade device

Pagina 384

Optional SSH parametersYou can adjust the following SSH settings on the Brocade device:• The number of SSH authentication retries• The user authentica

Pagina 385 - 802.1x port security

The default is yes .To deactivate password authentication, enter the following command.device(config)#ip ssh password-authentication noSyntax: ip ssh

Pagina 386

MAC address filter logging command syntax...250Configuring MAC filter accounting...

Pagina 387

Designating an interface as the source for all SSH packetsYou can designate a loopback interface, virtual interface, or Ethernet port as the source fo

Pagina 388

Displaying SSH connection informationTo display information about SSH connections, enter the show ip ssh command.device#show ip sshConnection Version

Pagina 389

SCP : EnabledSSH IPv4 clients : AllSSH IPv6 clients : AllSSH IPv4 access-group :SSH IPv6 access-group

Pagina 390

Displaying additional SSH connection informationThe show who command also displays information about SSH connections:device#show who Console con

Pagina 391

Example file transfers using SCPThe following are examples of using SCP to transfer files to and from a Brocade device.Copying a file to the running c

Pagina 392

To copy a software image file from an SCP-enabled client to the secondary flash on these devices,enter one of the following commands.C:\> scp FCXR0

Pagina 393

Importing an RSA private keyTo import an RSA private key from a client using SCP, enter a command such as the following one:C:\> scp keyfile user@1

Pagina 394

while you are connected to the device by any connection method (SSH2, Telnet, console). Brocadedevices support one outbound SSH2 client session at a t

Pagina 395

Generating and deleting a client RSA key pairTo generate a client RSA key pair, enter a command such as the following:device(config)#crypto key client

Pagina 396

Displaying SSH2 client informationFor information about displaying SSH2 client information, see the following sections:• Displaying SSH connection inf

Comentarios a estos manuales

Sin comentarios