Displaying a rule, Logging and analyzing security events, Attempted. refer to – Brocade Network OS Administrator’s Guide v4.1.1 User Manual
Page 276

After rule 155 is deleted, the SecAdminUser can no longer access the role command.
Displaying a rule
Enter the show running-config rule command in privileged EXEC mode to display all configured
rules. You can modify the output by using the command and specifying additional parameters.
switch# show running-config rule
rule 30 action accept operation read-write role NetworkSecurityAdmin rule 30 command
role
rule 31 action accept operation read-write role NetworkSecurityAdmin rule 31 command
rule
rule 32 action accept operation read-write role NetworkSecurityAdmin rule 32 command
username
rule 33 action accept operation read-write role NetworkSecurityAdmin rule 33 command
aaa
rule 34 action accept operation read-write role NetworkSecurityAdmin rule 34 command
radius-server
rule 35 action accept operation read-write role NetworkSecurityAdmin rule 35 command
configure
rule 40 action accept operation read-write role FCOEAdmin rule 40 command "interface
fcoe"
Logging and analyzing security events
Security event logging utilizes the RASLog audit infrastructure to record security-related audit events.
Any user-initiated security event generates an auditable event. Audited events are generated for all
Management interfaces. In Brocade VCS Fabric mode, for cluster-wide events, the audit is generated
on all switches of the cluster.
Refer to the Network OS Message Reference for information on how to configure, monitor, and
analyze security audit logging.
Displaying a rule
276
Network OS Administrator’s Guide
53-1003225-04