beautypg.com

Brocade FastIron Ethernet Switch Security Configuration Guide User Manual

Page 4

background image

Setting optional TACACS and TACACS+ parameters......................49
Configuring authentication-method lists forTACACS and

TACACS+....................................................................................50

Configuring TACACS+ authorization................................................ 53
TACACS+ accounting configuration................................................. 55
Configuring an interface as the source for allTACACS and

TACACS+ packets...................................................................... 56

Displaying TACACS/TACACS+ statistics andconfiguration

information...................................................................................57

RADIUS security........................................................................................... 58

RADIUS authentication, authorization, and accounting.................... 58
RADIUS configuration considerations...............................................61
Configuring RADIUS......................................................................... 61
Brocade-specific attributes on the RADIUS server........................... 62
Enabling SNMP to configure RADIUS.............................................. 63
Identifying the RADIUS server to the Brocade device...................... 64
Specifying different servers for individual AAA functions..................64
RADIUS server per port.................................................................... 64
RADIUS server to individual ports mapping......................................65
RADIUS parameters......................................................................... 66
Setting authentication-method lists for RADIUS............................... 67
RADIUS authorization.......................................................................69
RADIUS accounting.......................................................................... 71
Configuring an interface as the source for allRADIUS packets........ 72
Displaying RADIUS configuration information...................................72

SSL security..................................................................................................73

Specifying a port for SSL communication......................................... 73
Changing the SSL server certificate key size....................................74
Support for SSL digital certificates larger than 2048 bits.................. 74
Importing digital certificates and RSA private key files..................... 74
Generating an SSL certificate........................................................... 75
Deleting the SSL certificate...............................................................75

Authentication-method lists...........................................................................75

Configuration considerations for authentication-method lists........... 76
Examples of authentication-method lists...........................................76

TCP Flags - edge port security..................................................................... 78

Using TCP Flags in combination with other ACL features................ 79

SSH2 and SCP......................................................................................................................81

Supported SSH2 and Secure Copy features................................................ 81
SSH version 2 overview................................................................................81

Tested SSH2 clients..........................................................................82
SSH2 supported features..................................................................82
SSH2 unsupported features..............................................................83

SSH2 authentication types............................................................................83

Configuring SSH2............................................................................. 83
Enabling and disabling SSH by generating and deleting host

keys............................................................................................. 84

Configuring DSA or RSA challenge-response authentication...........86

Optional SSH parameters............................................................................. 88

Setting the number of SSH authentication retries.............................88
Deactivating user authentication.......................................................88
Enabling empty password logins.......................................................89
Setting the SSH port number............................................................ 89
Setting the SSH login timeout value................................................. 89
Designating an interface as the source for all SSH packets............. 90
Configuring the maximum idle time for SSH sessions...................... 90

4

FastIron Ethernet Switch Security Configuration Guide

53-1003088-03