beautypg.com

Displaying a rule, Logging and analyzing security events, Attempted. refer to – Brocade Network OS Administrator’s Guide v4.1.1 User Manual

Page 276

background image

After rule 155 is deleted, the SecAdminUser can no longer access the role command.

Displaying a rule

Enter the show running-config rule command in privileged EXEC mode to display all configured
rules. You can modify the output by using the command and specifying additional parameters.

switch# show running-config rule

rule 30 action accept operation read-write role NetworkSecurityAdmin rule 30 command

role

rule 31 action accept operation read-write role NetworkSecurityAdmin rule 31 command

rule

rule 32 action accept operation read-write role NetworkSecurityAdmin rule 32 command

username

rule 33 action accept operation read-write role NetworkSecurityAdmin rule 33 command

aaa

rule 34 action accept operation read-write role NetworkSecurityAdmin rule 34 command

radius-server

rule 35 action accept operation read-write role NetworkSecurityAdmin rule 35 command

configure

rule 40 action accept operation read-write role FCOEAdmin rule 40 command "interface

fcoe"

Logging and analyzing security events

Security event logging utilizes the RASLog audit infrastructure to record security-related audit events.
Any user-initiated security event generates an auditable event. Audited events are generated for all
Management interfaces. In Brocade VCS Fabric mode, for cluster-wide events, the audit is generated
on all switches of the cluster.

Refer to the Network OS Message Reference for information on how to configure, monitor, and
analyze security audit logging.

Displaying a rule

276

Network OS Administrator’s Guide

53-1003225-04