Brocade FastIron Ethernet Switch Security Configuration Guide User Manual
Page 21

Ways to secure management access to Brocade devices (Continued)
TABLE 2
Access method
How the access method is
secured by default
Ways to secure the
access method
See page
Allow Telnet access
only from specific MAC
addresses
Restricting Telnet access to a
specific VLAN
on page 28
Define the Telnet idle
time
page 27
Change the Telnet
login timeout period
Changing the login timeout period
for Telnet sessions
on page 28
Specify the maximum
number of login
attempts for Telnet
access
Specifying the maximum number of
login attemptsfor Telnet access
page 27
Disable Telnet access
on page
31
Establish a password
for Telnet access
on page
32
Establish passwords
for privilege levels of
the CLI
Setting passwords for management
privilege levels
on page 32
Set up local user
accounts
on page 35
Configure TACACS/
TACACS+ security
on page 42
Configure RADIUS
security
on page 58
Secure Shell (SSH)
access
Not configured
Configure SSH
Refer to the Configuring
SSH2 section
Regulate SSH access
using ACLs
Using an ACL to restrict
SSH access
on page
24
Allow SSH access only
from specific IP
addresses
Restricting SSH access
to a specific IP address
on page 26
Allow SSH access only
from specific MAC
addresses
Restricting access to the
device based on IP
orMAC address
on page
26
Establish passwords
for privilege levels of
the CLI
Setting passwords for
management privilege
levels
Security Access
FastIron Ethernet Switch Security Configuration Guide
21
53-1003088-03