Authentication Servers On The Switch; Displaying The Current Radius Configuration - HP A7533A - Brocade 4Gb SAN Switch Base Administrator's Manual

Hp storageworks fabric os 6.2 administrator guide (5697-0016, may 2009)
Hide thumbs Also See for A7533A - Brocade 4Gb SAN Switch Base:
Table of Contents

Advertisement

Example using Administrative Domains:
adlist_0_10_200_endAd
Home Admin Domain (homeAD) for the user will be the first value in the adlist (Admin Domain list).
If a user has no values assigned in the adlist attribute, the homeAD '0' will be the default
administrative domain for the user.
• If you are using Virtual Fabrics, enter the value of the Logical Fabric separated by a semi-colon ( ; )
into the Value field.
Example using Virtual Fabrics:
HomeLF=10;LFRoleList=admin:128,10;ChassisRole=admin
In this example, the Logical Switch that would be logged into by default is 10. If 10 is not available,
the lowest FID available will be chosen. You would have permission to enter logical switch 128 and
10 in an admin role and you would also have the chassis role permission of admin.
NOTE:
importing and exporting schemas, see your Microsoft documentation or visit www.microsoft.com.

Authentication servers on the switch

At least one RADIUS or LDAP server must be configured before you can enable RADIUS or LDAP service.
You can configure the RADIUS or LDAP service even if it is disabled on the switch, and can configure up to
five RADIUS or LDAP servers. You must be logged in as admin or switchAdmin to configure the RADIUS
service.
NOTE:
On dual-CP switches (HP StorageWorks 4/256 SAN Director, HP StorageWorks DC SAN
Backbone Director and HP StorageWorks DC04 SAN Director Switch enterprise-class platforms), the switch
sends its RADIUS or LDAP request using the IP address of the active CP. When adding clients, add both the
active and standby CP IP addresses so that users can still log in to the switch in the event of a failover.
RADIUS or LDAP configuration is chassis-based configuration data. On platforms containing multiple
switch instances, the configuration applies to all instances. The configuration is persistent across reboot
and firmwareDownload. On a chassis-based system, the command must replicate the configuration to the
standby CP.
Multiple login sessions can invoke the command simultaneously. The last session that applies the change
will be the one whose configuration is in effect. This configuration is persistent after an HA failover.
The RADIUS or LDAP servers are contacted in the order they are listed, starting from the top of the list and
moving to the bottom.

Displaying the current RADIUS configuration

1.
Connect to the switch and log in using an account assigned to the admin role.
2.
Enter the following command:
switch:admin> aaaConfig --show
If a configuration exists, its parameters are displayed. If RADIUS or LDAP service is not configured, only
the parameter heading line is displayed. Parameters include:
Position
Server
Port
Secret
Timeouts
Authentication
You can perform batch operations using the Ldifde.exe utility. For more information on
The order in which servers are contacted to provide service.
The server names or IPv4 or IPv6 addresses.
The server ports.
The shared secrets.
The length of time servers have to respond before the next server is contacted.
The type of authentication being used on servers.
Fabric OS 6.2 administrator guide
95

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents