Brocade FastIron Ethernet Switch Security Configuration Guide User Manual
Page 5
Displaying SSH connection information.............................................. 91
Displaying SSH configuration information...........................................91
Displaying additional SSH connection information..............................93
Enabling and disabling SCP................................................................93
Secure copy configuration notes.........................................................93
Example file transfers using SCP........................................................94
Enabling SSH2 client.......................................................................... 97
Configuring SSH2 client public key authentication..............................97
Using SSH2 client............................................................................... 98
Displaying SSH2 client information..................................................... 99
Supported Rule-Based IP ACL Features...................................................... 101
ACL overview................................................................................................ 103
Types of IP ACLs.............................................................................. 104
ACL IDs and entries.......................................................................... 104
Numbered and named ACLs.............................................................105
Default ACL action............................................................................ 105
How hardware-based ACLs work..................................................................106
ACL configuration considerations................................................................. 106
Configuring standard numbered ACLs..........................................................107
Standard numbered ACL syntax....................................................... 108
Configuration example for standard numbered ACLs....................... 109
Standard named ACL configuration.............................................................. 109
Standard named ACL syntax............................................................ 109
Configuration example for standard named ACLs............................ 111
Extended numbered ACL configuration........................................................ 112
Extended numbered ACL syntax...................................................... 112
Extended named ACL configuration............................................................. 118
Applying egress ACLs to Control (CPU) traffic............................................. 122
Preserving user input for ACL TCP/UDP port numbers................................ 122
ACL comment text management...................................................................123
Adding a comment to an entry in a numbered ACL.......................... 123
Adding a comment to an entry in a named ACL............................... 124
Deleting a comment from an ACL entry............................................ 124
Viewing comments in an ACL........................................................... 124
Applying an ACL to a virtual interface in a protocol-or subnet-based VLAN.125
ACL logging...................................................................................................126
Configuration notes for ACL logging................................................. 126
Configuration tasks for ACL logging..................................................127
Example ACL logging configuration.................................................. 127
Displaying ACL Log Entries.............................................................. 128
Enabling strict control of ACL filtering of fragmented packets.......................128
Enabling ACL support for switched traffic in the router image...................... 129
Enabling ACL filtering based on VLAN membership or VE port
Configuration notes for ACL filtering................................................. 130
Applying an IPv4 ACL to specific VLAN members on a port
(Layer 2 devices only)................................................................. 131
FastIron Ethernet Switch Security Configuration Guide
5
53-1003088-03