beautypg.com

Client-identity – Brocade Mobility RFS Controller CLI Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 219

background image

Brocade Mobility RFS Controller CLI Reference Guide

203

53-1003098-01

4

2013-01-28 19:56:31

rfs4000-229D58

SYSTEM

UI_USER_AUTH_SUCCESS UI

user

'admin' from: '192.168.100.173' authentication successful

2013-01-27 20:15:20 rfs4000-229D58 SYSTEM LOGOUT Logged

out user 'admin' with privilege 'superuser' from '192.168.100.204'

2013-01-27 20:14:45 rfs4000-229D58 SYSTEM LOGIN

Successfully logged in user 'admin' with privilege 'superuser' from 'ssh'

2013-01-27 19:53:25 rfs4000-229D58 SYSTEM LOGOUT Logged

out user 'admin' with privilege 'superuser' from '192.168.100.204'

2013-01-27 19:43:22 rfs4000-229D58 SYSTEM LOGIN

Successfully logged in user 'admin' with privilege 'superuser' from 'ssh'

--More--

rfs4000-229D58#

rfs4000-229D58#clear event-history

rfs4000-229D58#

rfs4000-229D58#show event-history

EVENT HISTORY REPORT

Generated on '2013-02-15 14:59:21 UTC' by 'admin'

2013-02-15 14:44:19 rfs4000-229D58 SYSTEM CLOCK_RESET System

clock reset, Time: 2013-02-15 14:45:30

rfs4000-229D58#

client-identity

Global Configuration Commands

With an increase in Bring Your Own Device (BYOD) corporate networks, there is a parallel increase
in the number of possible attack scenarios within the network. BYOD devices are inherently unsafe,
as the organization’s security mechanisms do not extend to these personal devices deployed in the
corporate wireless network. Organizations can protect their network by limiting how and what these
BYODs can access on and through the corporate network.

Device fingerprinting assists administrators by controlling how BYOD devices access a corporate
wireless domain.

Device fingerprinting uses DHCP options sent by the client in request or discover packets to derive
a unique signature specific to device class. For example, Apple devices have a different signature
from Android devices. The signature is used to classify the devices and assign permissions and
restrictions on each device class.

The following table summarizes the commands available for creating and configuring a set of new
client identity parameters.

client-identity

client-identity

Command

Description

Reference

client-identity

Creates a new client identity and enters its configuration mode

page 203

client-identity-mode
commands

Invokes the client identity policy configuration mode commands

page 205

client-identity-group

Creates a new client identity group and enters its configuration mode

page 209