Introduction, In this chapter, Common criteria operational requirements – Brocade Mobility RFS7000-GR Controller CLI Reference Guide (Supporting software release 4.1.0.0-040GR and later) User Manual
Page 15: 1 introduction, Chapter 1, “introduction
Brocade Mobility RFS7000-GR Controller CLI Reference Guide
1
53-1001945-01
Chapter
1
Introduction
In this chapter
•
•
Common Criteria Operational Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 1
•
•
•
Using the no and default forms of Commands . . . . . . . . . . . . . . . . . . . . . . . 13
•
Setting the Administrator Inactivity Timeout . . . . . . . . . . . . . . . . . . . . . . . . . 14
•
•
Using CLI Editing Features and Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
This chapter describes the commands used by the Brocade Mobility RFS7000-GR Controller
Command Line Interface (CLI). Access the CLI by running a terminal emulation program on a
computer connected to the serial port at the front of the switch, or by using telnet or secure shell
(ssh) to access the switch over the network.
The default cli user is cli. The default username and password is admin and superuser,
respectively.
Common Criteria Operational Requirements
To run the product in the Common Criteria evaluated configuration, the following conditions must
be met:
1. The product shall run in the FIPS mode of operation. For FIPS configuration information please
refer to the “Secure Installation Procedure” section of the Brocade Mobility RFS7000-GR
Controller Switch Installation Guide
2. The product shall be configured to use an external FIPS-compliant RADIUS server for
authentication of wireless users using EAP-TLS, EAP-PEAP or EAP-TTLS protocol.
3. The product shall use the internal administrator database for authentication of administrators
4. The product shall be configured to use an external NTP server for time synchronization
5. The product shall be configured to use an external audit server for transmission of audit
records
6. Connections to the external servers shall be protected by an encrypted IPSec/IKE tunnel.
7. In support of the audit server, the IT environment shall provide the capability to protect audit
information and authentication credentials. The environment shall also provide the capability
to selectively view audit data.
8. In support of the authentication server, the IT environment shall provide facilities to manage
authentication information and limit brute force password attacks.