HP 316095-B21 FW 08.01.00 McDATA EFCM Basic User Manual (620-000240-000, Novem - Page 107

Configuring Security, Defining Authentication Settings

Page 107 highlights

5 Configuring Security The Security menu is used to configure the ability of users and devices to communicate with the product. You must be logged in with administrator access to use the commands on the Security menu. The Security menu provides the following options: • Configuring User Authentication 5-2 • Configuring Software Authentication 5-6 • Configuring Device Authentication 5-10 • Configuring Port Authentication 5-14 • Configuring the IP Access Control List 5-15 • Configuring the RADIUS Server 5-18 • Enabling the Enterprise Fabric Mode 5-22 • Configuring Fabric Binding 5-25 • Configuring Switch Binding 5-29 • Configuring Port Binding 5-33 • Enabling and Disabling Safe Zoning Mode 5-34 • Upgrade Options 5-35 Defining Authentication Settings The Authentication Settings page allows the user to configure authentication parameters for Users, Software, Devices, and Ports. The Authentication Settings page has tabs that are used to configure various types of authentications: • Users tab-Configuring User Authentication on page 5-2 • Software tab-Configuring Software Authentication on page 5-6 Configuring Security 5-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312

Configuring Security
5-1
5
Configuring Security
The
Security
menu is used to configure the ability of users and devices
to communicate with the product. You must be logged in with
administrator access to use the commands on the
Security
menu. The
Security menu provides the following options:
Configuring User Authentication
........................................................
5-2
Configuring Software Authentication
..................................................
5-6
Configuring Device Authentication
...................................................
5-10
Configuring Port Authentication
.......................................................
5-14
Configuring the IP Access Control List
.............................................
5-15
Configuring the RADIUS Server
.......................................................
5-18
Enabling the Enterprise Fabric Mode
.................................................
5-22
Configuring Fabric Binding
...............................................................
5-25
Configuring Switch Binding
..............................................................
5-29
Configuring Port Binding
..................................................................
5-33
Enabling and Disabling Safe Zoning Mode
.......................................
5-34
Upgrade Options
................................................................................
5-35
Defining Authentication Settings
The
Authentication Settings
page allows the user to configure
authentication parameters for Users, Software, Devices, and Ports.
The
Authentication Settings
page has tabs that are used to configure
various types of authentications:
Users tab—
Configuring User Authentication
on page 5-2
Software tab—
Configuring Software Authentication
on page 5-6