beautypg.com

Brocade Network OS Administrator’s Guide v4.1.1 User Manual

Page 9

background image

Password policies overview.............................................................. 265
Configuring password policies.......................................................... 267

Understanding and managing role-based access control (RBAC)................269

Default roles...................................................................................... 269
User-defined roles.............................................................................269
Displaying a role................................................................................270
Creating or modifying a role.............................................................. 270
Deleting a role................................................................................... 270
Commonly used roles....................................................................... 270

Understanding and managing command access rules................................. 271

Specifying rule commands with multiple options...............................272
Verifying rules for configuration commands...................................... 272
Configuring rules for operational commands.................................... 273
Configuring rules for interface key-based commands.......................273
Configuring a placeholder rule.......................................................... 274
Configuring rule processing.............................................................. 274
Adding a rule..................................................................................... 275
Changing a rule.................................................................................275
Deleting a rule................................................................................... 275
Displaying a rule................................................................................276

Logging and analyzing security events......................................................... 276

Configuring External Server Authentication............................................................................277

Understanding and configuring remote server authentication.......................277

Remote server authentication overview............................................ 277
Configuring remote server authentication......................................... 278

Understanding and configuring RADIUS.......................................................280

Authentication and accounting.......................................................... 280
Authorization..................................................................................... 280
Account password changes.............................................................. 280
RADIUS authentication through management interfaces................. 280
Configuring server side RADIUS support..........................................281
Configuring client side RADIUS support........................................... 283

Understanding and configuring TACACS+ ...................................................285

TACACS+ authorization.................................................................... 286
TACACS+ authentication through management interfaces.............. 286
Supported TACACS+ packages and protocols................................. 286
TACACS+ configuration components............................................... 286
Configuring the client for TACACS+ support.....................................286
Configuring TACACS+ accounting on the client side........................289
Configuring TACACS+ on the server side ........................................291
Configuring TACACS+ for a mixed vendor environment...................293

Understanding and configuring LDAP...........................................................293

User authentication........................................................................... 294
Server authentication........................................................................ 294
Server authorization.......................................................................... 295
FIPS compliance............................................................................... 295
Configuring LDAP............................................................................. 295

Configuring Fabric Authentication......................................................................................... 303

Fabric authentication overview......................................................................303

DH-CHAP..........................................................................................303
Shared secret keys........................................................................... 303
Switch connection control (SCC) policy............................................ 304
Port security...................................................................................... 305

Understanding fabric authentication..............................................................307

Network OS Administrator’s Guide

9

53-1003225-04