beautypg.com

Brocade FastIron Ethernet Switch Security Configuration Guide User Manual

Page 21

background image

Ways to secure management access to Brocade devices (Continued)

TABLE 2

Access method

How the access method is
secured by default

Ways to secure the
access method

See page

Allow Telnet access
only from specific MAC
addresses

Restricting Telnet access to a
specific VLAN

on page 28

Define the Telnet idle
time

Defining the Telnet idle time

on

page 27

Change the Telnet
login timeout period

Changing the login timeout period
for Telnet sessions

on page 28

Specify the maximum
number of login
attempts for Telnet
access

Specifying the maximum number of
login attemptsfor Telnet access

on

page 27

Disable Telnet access

Disabling Telnet access

on page

31

Establish a password
for Telnet access

Setting a Telnet password

on page

32

Establish passwords
for privilege levels of
the CLI

Setting passwords for management
privilege levels

on page 32

Set up local user
accounts

Local user accounts

on page 35

Configure TACACS/
TACACS+ security

TACACS and TACACS+ security

on page 42

Configure RADIUS
security

RADIUS security

on page 58

Secure Shell (SSH)
access

Not configured

Configure SSH

Refer to the Configuring
SSH2 section

Regulate SSH access
using ACLs

Using an ACL to restrict
SSH access

on page

24

Allow SSH access only
from specific IP
addresses

Restricting SSH access
to a specific IP address

on page 26

Allow SSH access only
from specific MAC
addresses

Restricting access to the
device based on IP
orMAC address

on page

26

Establish passwords
for privilege levels of
the CLI

Setting passwords for
management privilege
levels

on page 32

Security Access

FastIron Ethernet Switch Security Configuration Guide

21

53-1003088-03