User Authentication; Table 5.1 Type Of Client Public Key - Fujitsu ETERNUS DX80 S2 Overview

Disk storage system
Hide thumbs Also See for ETERNUS DX80 S2:
Table of Contents

Advertisement

Chapter 5 Basic Functions
5.2 Security
5.2.2

User Authentication

Internal Authentication and External Authentication are available as logon authentication methods. RADIUS
authentication can be used for External Authentication.
Internal Authentication
Internal Authentication is performed using the authentication function of the ETERNUS DX Disk storage
system.
The following authentication functions are available when the ETERNUS DX Disk storage system is connected
via a LAN using operation management software.
User account authentication
User account authentication uses the user account information that is registered in the ETERNUS DX Disk
storage system to verify user logins. Up to 64 user accounts can be set.
SSL authentication
ETERNUS Web GUI supports https connections using SSL/TLS. Since data on the network is encrypted,
security can be ensured. Server certifications that are required for connection are obtained by installing
authenticated certifications or by being automatically created in the ETERNUS DX Disk storage system.
SSH authentication
Since ETERNUS CLI supports SSH connections, data on the network can be encrypted and sent/received. The
server key for SSH varies depending on the ETERNUS DX Disk storage system. When the server certification
is updated, the server key is updated as well.
Password authentication and client public key authentication are available as authentication methods for
SSH connections.
The following table shows the supported client public keys.
Table 5.1
OpenSSH style RSA for SSH v1
IETF style DSA for SSH v2
IETF style RSA for SSH v2
The following iSCSI authentication is available for a host connection and remote copy.
iSCSI authentication
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI connections. For CHAP
Authentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is
used, the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access and the initiator authenticates the
target to prevent impersonation. CHAP is supported by host connections (iSCSI-CA) and REC connections
(iSCSI-RA). In addition, Internet Storage Name Service (iSNS) is supported as the iSCSI name solution.
Type of client public key
Type of public key
ETERNUS DX80 S2/DX90 S2 Disk storage system Overview
Copyright 2013 FUJITSU LIMITED
Complexity (bits)
1024, 2048, 4096
1024, 2048, 4096
1024, 2048, 4096
53
P3AM-4812-11ENZ0

Advertisement

Table of Contents
loading

This manual is also suitable for:

Eternus dx90 s2

Table of Contents