Qlogic 5800V Series Installation Manual page 64

Stackable fibre channel switch
Hide thumbs Also See for 5800V Series:
Table of Contents

Advertisement

2–Planning
Security
To secure F_Ports and E_Ports, and pass authorization and authentication to a
RADIUS server:
1.
Configure the Radius_1 host as a RADIUS server on Switch_1 and
Switch_2 to authenticate device logins, as shown in the following table:
Specify the server IP address and the secret with which the switches will
authenticate with the server. Configure the switches so that devices
authenticate through the switches only if the RADIUS server is unavailable.
2.
Create a security set (Security_Set_1) on Switch_1.
a.
2-26
Device Authentication
Order
Total Servers
Device Authentication
Server
Server IP Address
Secret
Create a port group (Group_Port_1) in Security_Set_1 with Switch_1
and Adapter_1 as members, as shown in the following:
Switch_1
Node WWN: 10:00:00:c0:dd:07:e3:4c
Authentication: CHAP
Primary Hash: MD5
Primary Secret: 0123456789abcdef
Adapter_1
Node WWN: 10:00:00:c0:dd:07:c3:4d
Authentication: CHAP
Primary Hash: MD5
Primary Secret: fedcba9876543210
RadiusLocal—Authenticate devices using the
RADIUS server security database first. If the RADIUS
server is unavailable, use the local switch security
database.
1—Enables support for one RADIUS server
True—Enables Radius_1 to authenticate device log-
ins.
10.20.30.40
1234567890123456—16-character ASCI string (MD5
hash). This is the secret that allows direct communica-
tion with the RADIUS server.
59265-02 B

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents