Brocade Communications Systems 6650 Switch User Manual


 
310 Brocade ICX 6650 Security Configuration Guide
53-1002601-01
show dot1x statistics, 187
show interface
, 188
show ip access-list
, 103
show ip arp inspection
, 283
show ip client-pub-key
, 69
show ip dhcp relay information
, 293
show ip dhcp snooping
, 287
show ip ssh
, 72
show ip ssh config
, 73
show ipv6 access-list
, 130, 139
show log
, 107
show logging
, 227
show mac-address
, 226
show port security ethernet
, 208, 210
show port security mac
, 208
show port security statistics
, 209
show rate-limit fixed
, 275
show rate-limit output-shaping
, 277
show run
, 19
show statistics dos-attack
, 271
show table-mac-vlan
, 221, 225, 229
show table-mac-vlan denied-mac
, 223
show who
, 74
show-traffic policy
, 152
Smurf attack protection
, 267
SNMP
displaying community string
, 16
enabling to configure RADIUS
, 47
generating traps for multi-device port authentication
,
239
using to configure MAC-based VLANs
, 221
SSH
configuring maximum idle time
, 71
designating an interface as the source for all packets
,
71
displaying information
, 72
filtering access using ACLs
, 72
setting login timeout value
, 71
setting port number
, 71
terminating an active connection
, 72
SSH authentication
setting the number of retries
, 70
SSH2
configuration
, 65
DSA challenge-response authentication
, 65
password authentication
, 65
RSA challenge-response authentication
, 65
use with secure copy
, 75
SSH2 client
configuring public key authentication
, 78
displaying information
, 80
enabling
, 78
overview
, 78
using
, 79
T
TACACS
authentication
, 27
enabling
, 31
TACACS and TACACS+
authentication, authorization, and accounting
, 25
configuration
, 30
configuration considerations
, 30
configuring an interface for all packets
, 40
configuring authentication-method lists
, 34
configuring for devices in a Brocade IronStack
, 25
how they differ
, 24
identifying servers
, 31
security
, 24
setting optional parameters
, 32
setting the retransmission limit
, 33
TACACS+
accounting
, 28
accounting configuration
, 39
authorization
, 28
configuring authorization
, 36
prompts when server is unavailable
, 35
setting the key
, 33
specifying servers for individual AAA functions
, 32
TCP flags
, 59, 60
TCP flags and edge port security
, 114
Test-Route
set ip next hop
, 123
traffic policies
configuration notes and feature limitations
, 143
CoS parameters for packets
, 145
CPU rate-limiting
, 277
overview
, 299
viewing
, 152
U
user accounts
defining local
, 17
local configuration
, 21
local with encrypted passwords
, 23
local with no passwords
, 22
local with unencrypted passwords
, 22
user authentication, deactivating
, 70
username