
Ways to secure management access to Brocade devices (Continued)TABLE 2
Access method How the access method is
secured by default
Ways to secure the
access method
See page
Allow Telnet access
only from specific MAC
addresses
Restricting Telnet access to a
specific VLAN on page 28
Define the Telnet idle
time
Defining the Telnet idle time on
page 27
Change the Telnet
login timeout period
Changing the login timeout period
for Telnet sessions on page 28
Specify the maximum
number of login
attempts for Telnet
access
Specifying the maximum number of
login attemptsfor Telnet access on
page 27
Disable Telnet access Disabling Telnet access on page
31
Establish a password
for Telnet access
Setting a Telnet password on page
32
Establish passwords
for privilege levels of
the CLI
Setting passwords for management
privilege levels on page 32
Set up local user
accounts
Local user accounts on page 35
Configure TACACS/
TACACS+ security
TACACS and TACACS+ security
on page 42
Configure RADIUS
security
RADIUS security on page 58
Secure Shell (SSH)
access
Not configured Configure SSH Refer to the Configuring
SSH2 section
Regulate SSH access
using ACLs
Using an ACL to restrict
SSH access on page
24
Allow SSH access only
from specific IP
addresses
Restricting SSH access
to a specific IP address
on page 26
Allow SSH access only
from specific MAC
addresses
Restricting access to the
device based on IP
orMAC address on page
26
Establish passwords
for privilege levels of
the CLI
Setting passwords for
management privilege
levels on page 32
Security Access
FastIron Ethernet Switch Security Configuration Guide 21
53-1003088-03
Comentarios a estos manuales