Client-identity – Brocade Mobility RFS Controller CLI Reference Guide (Supporting software release 5.5.0.0 and later) User Manual
Page 219

Brocade Mobility RFS Controller CLI Reference Guide
203
53-1003098-01
4
2013-01-28 19:56:31
rfs4000-229D58
SYSTEM
UI_USER_AUTH_SUCCESS UI
user
'admin' from: '192.168.100.173' authentication successful
2013-01-27 20:15:20 rfs4000-229D58 SYSTEM LOGOUT Logged
out user 'admin' with privilege 'superuser' from '192.168.100.204'
2013-01-27 20:14:45 rfs4000-229D58 SYSTEM LOGIN
Successfully logged in user 'admin' with privilege 'superuser' from 'ssh'
2013-01-27 19:53:25 rfs4000-229D58 SYSTEM LOGOUT Logged
out user 'admin' with privilege 'superuser' from '192.168.100.204'
2013-01-27 19:43:22 rfs4000-229D58 SYSTEM LOGIN
Successfully logged in user 'admin' with privilege 'superuser' from 'ssh'
--More--
rfs4000-229D58#
rfs4000-229D58#clear event-history
rfs4000-229D58#
rfs4000-229D58#show event-history
EVENT HISTORY REPORT
Generated on '2013-02-15 14:59:21 UTC' by 'admin'
2013-02-15 14:44:19 rfs4000-229D58 SYSTEM CLOCK_RESET System
clock reset, Time: 2013-02-15 14:45:30
rfs4000-229D58#
client-identity
With an increase in Bring Your Own Device (BYOD) corporate networks, there is a parallel increase
in the number of possible attack scenarios within the network. BYOD devices are inherently unsafe,
as the organization’s security mechanisms do not extend to these personal devices deployed in the
corporate wireless network. Organizations can protect their network by limiting how and what these
BYODs can access on and through the corporate network.
Device fingerprinting assists administrators by controlling how BYOD devices access a corporate
wireless domain.
Device fingerprinting uses DHCP options sent by the client in request or discover packets to derive
a unique signature specific to device class. For example, Apple devices have a different signature
from Android devices. The signature is used to classify the devices and assign permissions and
restrictions on each device class.
The following table summarizes the commands available for creating and configuring a set of new
client identity parameters.
client-identity
Command
Description
Reference
Creates a new client identity and enters its configuration mode
Invokes the client identity policy configuration mode commands
Creates a new client identity group and enters its configuration mode