Brocade Mobility RFS Controller System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 690

Advertising
background image

678

Brocade Mobility RFS Controller System Reference Guide

53-1003099-01

12

4. Set the following HTTP/HTTPS parameters:

NOTE

If the a RADIUS server is not reachable, HTTPS or SSH management access to the controller or
service platform may be denied.

5. Set the following parameters required for FTP access:

6. Set the following General parameters:

7. Set the following Access Restriction parameters:

Enable HTTP

Select the checkbox to enable HTTP device access. HTTP provides limited authentication and no
encryption.

Enable HTTPS

Select the checkbox to enable HTTPS device access. HTTPS (Hypertext Transfer Protocol Secure) is
more secure plain HTTP. HTTPS provides both authentication and data encryption as opposed to
just authentication (as is the case with HTTP).

Enable FTP

Select the checkbox to enable FTP device access. FTP (File Transfer Protocol) is the standard
protocol for transferring files over a TCP/IP network. FTP requires administrators enter a valid
username and password authenticated locally. FTP access is disabled by default.

FTP Username

Specify a username required when logging in to the FTP server. The username cannot exceed 32
characters.

FTP Password

Specify a password required when logging in to the FTP server. Reconfirm the password in the field
provided to ensure it has been entered correctly. The password cannot exceed 63 characters.

FTP Root Directory

Provide the complete path to the root directory in the space provided. The default setting has the
root directory set to flash:/

Idle Session Timeout

Specify an inactivity timeout for management connection attempts (in seconds) from
0 - 1,440.

Message of the Day

Enter message of the day text (no longer then 255 characters) displayed at login for clients
connecting via the CLI.

Filter Type

Select a filter type for access restriction. Options include IP Access List, Source Address or None. To
restrict management access to specific hosts, select Source Address as the filter type and provide
the allowed addresses within the Source Hosts field.

IP Access List

If the selected filter type is IP Access List, select an access list from the drop-down menu or select
the Create button to define a new one. IP based firewalls function like Access Control Lists (ACLs) to
filter/mark packets based on the IP from which they arrive, as opposed to filtering packets on layer
2 ports. IP firewalls implement uniquely defined access control policies, so if you don't have an idea
of what kind of access to allow or deny, a firewall is of little value, and could provide a false sense
of network security.

Source Hosts

If the selected filter type is Source Address, enter an IP Address or IP Addresses for the source
hosts. To restrict management access to specific hosts, select Source Address as the filter type and
provide the allowed addresses within the Source Hosts field.

Source Subnets

If the selected filter type is Source Address, enter a source subnet or subnets for the source hosts.
To restrict management access to specific subnets, select Source Address as the filter type and
provide the allowed addresses within the Source Subnets field.

Logging Policy

If the selected filter is Source Address, enter a logging policy for administrative access. Options
includes None, Denied Requests or All.

Advertising