Configuring Security; Defining Authentication Settings; Security Menu - McDATA 316095-B21 - StorageWorks Edge Switch 2/24 User Manual

Fw 08.01.00 mcdata efcm basic user manual (620-000240-000, november 2005)
Hide thumbs Also See for 316095-B21 - StorageWorks Edge Switch 2/24:
Table of Contents

Advertisement

Defining Authentication Settings

The Security menu is used to configure the ability of users and devices
to communicate with the product. You must be logged in with
administrator access to use the commands on the Security menu. The
Security menu provides the following options:
• Configuring User Authentication ........................................................ 5-2
• Configuring Software Authentication.................................................. 5-6
• Configuring Device Authentication ................................................... 5-10
• Configuring Port Authentication....................................................... 5-14
• Configuring the IP Access Control List ............................................. 5-15
• Configuring the RADIUS Server....................................................... 5-18
• Enabling the Enterprise Fabric Mode................................................. 5-22
• Configuring Fabric Binding ............................................................... 5-25
• Configuring Switch Binding .............................................................. 5-29
• Configuring Port Binding .................................................................. 5-33
• Enabling and Disabling Safe Zoning Mode ....................................... 5-34
• Upgrade Options ................................................................................ 5-35
The Authentication Settings page allows the user to configure
authentication parameters for Users, Software, Devices, and Ports.
The Authentication Settings page has tabs that are used to configure
various types of authentications:
Users
tab-Configuring User Authentication
Software
tab-Configuring Software Authentication

Configuring Security

on page 5-2
on page 5-6
Configuring Security
5
5-1

Advertisement

Table of Contents
loading

Table of Contents