Brocade Communications Systems Brocate Ethernet Access Switch 6910 User Manual

Page 33

Advertising
background image

Brocade 6910 Ethernet Access Switch Configuration Guide

xxxiii

53-1002581-01

Figure 161 Configuring the Authentication Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 823
Figure 162 Authentication Server Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 824
Figure 163 Configuring Remote Authentication Server (RADIUS) . . . . . . . . . . . . . . . . . . . . 826
Figure 164 Configuring Remote Authentication Server (TACACS+) . . . . . . . . . . . . . . . . . . . 826
Figure 165 Configuring AAA Server Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Figure 166 Showing AAA Server Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Figure 167 Configuring Global Settings for AAA Accounting . . . . . . . . . . . . . . . . . . . . . . . . . 829
Figure 168 Configuring AAA Accounting Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 830
Figure 169 Showing AAA Accounting Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 830
Figure 170 Configuring AAA Accounting Service for 802.1X Service . . . . . . . . . . . . . . . . . . 831
Figure 171 Configuring AAA Accounting Service for Exec Service . . . . . . . . . . . . . . . . . . . . 831
Figure 172 Displaying a Summary of Applied AAA Accounting Methods . . . . . . . . . . . . . . . 831
Figure 173 Displaying Statistics for AAA Accounting Sessions. . . . . . . . . . . . . . . . . . . . . . . 832
Figure 174 Configuring AAA Authorization Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 833
Figure 175 Showing AAA Authorization Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 834
Figure 176 Configuring AAA Authorization Methods for Exec Service . . . . . . . . . . . . . . . . . 834
Figure 177 Displaying the Applied AAA Authorization Method . . . . . . . . . . . . . . . . . . . . . . . 834
Figure 178 Configuring User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Figure 179 Showing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Figure 180 Configuring Global Settings for Web Authentication . . . . . . . . . . . . . . . . . . . . . 837
Figure 181 Configuring Interface Settings for Web Authentication . . . . . . . . . . . . . . . . . . . 838
Figure 182 Configuring Global Settings for Network Access . . . . . . . . . . . . . . . . . . . . . . . . 841
Figure 183 Configuring Interface Settings for Network Access . . . . . . . . . . . . . . . . . . . . . . 843
Figure 184 Configuring Link Detection for Network Access . . . . . . . . . . . . . . . . . . . . . . . . . 844
Figure 185 Configuring a MAC Address Filter for Network Access. . . . . . . . . . . . . . . . . . . . 845
Figure 186 Showing the MAC Address Filter Table for Network Access . . . . . . . . . . . . . . . 845
Figure 187 Showing Addresses Authenticated for Network Access. . . . . . . . . . . . . . . . . . . 846
Figure 188 Configuring HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
Figure 189 Downloading the Secure-Site Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Figure 190 Configuring the SSH Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Figure 191 Generating the SSH Host Key Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Figure 192 Showing the SSH Host Key Pair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 854
Figure 193 Copying the SSH User’s Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 855
Figure 194 Showing the SSH User’s Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856
Figure 195 Setting the Name of a Time Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
Figure 196 Showing a List of Time Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 858
Figure 197 Add a Rule to a Time Range. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Figure 198 Showing the Rules Configured for a Time Range . . . . . . . . . . . . . . . . . . . . . . . . 859
Figure 199 Showing TCAM Utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860
Figure 200 Creating an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Figure 201 Showing a List of ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Figure 202 Configuring a Standard IPv4 ACL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863

Advertising