HP 316095-B21 FW 08.01.00 McDATA EFCM Basic User Manual (620-000240-000, Novem - Page 119

Adding a Device to the Authentication Devices List, Attached Devices, Secret, Chap Secrets

Page 119 highlights

Configuring Device Authentication 5 If you use the arrow buttons between the Attached Devices and CHAP Secret panels to return the device to the Attached Devices panel, no CHAP secret value is assigned to the device. If the device is a detached device, the WWN of the device is removed. Adding a Device to the Authentication Devices List The arrow buttons between the Chap Secrets dialog and the Authentication Devices dialog are used to add and remove devices from the Authentication Devices list. NOTE: The number of the E_Port and N_Port device records is limited to 768 records for 12-Port Switch, 24-Port Switch, 16-Port 4-Gbps Switch, and 32-Port 4-Gbps Switch. The limit is 252 records for the 140-Port Director. The limit is 128 records for the 16-Port 2-Gbps Switch, 32-Port 2-Gbps Switch, and 64-Port Director. In order to add a device to the Authentication Devices list, you must complete the fields of the CHAP Secret dialog as described in Applying a CHAP Secret to the Device on page 5-12. Use the arrow button between the CHAP Secret and Authentication Devices areas to add the device to the Authentication Devices list. The device is configured to be authenticated immediately after being added to the list. The Authenticated Devices list shows the WWN and type of each device on the list. You can select the devices individually and send back the CHAP Secret dialog for editing using the arrow button. This does not remove the device from the list. Removing a Device from the Authentication Devices List Remove a device from the Authentication Device list by selecting it, then selecting the Remove button. This removes the CHAP secret configuration from the device. Attached devices that are removed from the list are re-populated to the Attached Devices dialog. Detached devices that are removed are permanently deleted from the page. Configuring Security 5-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312

5
Configuring Security
5-13
Configuring Device Authentication
If you use the arrow buttons between the
Attached Devices
and
CHAP
Secret
panels to return the device to the
Attached Devices
panel, no
CHAP secret value is assigned to the device. If the device is a
detached device, the WWN of the device is removed.
Adding a Device to
the Authentication
Devices List
The arrow buttons between the
Chap Secrets
dialog and the
Authentication Devices
dialog are used to add and remove devices
from the Authentication Devices list.
NOTE:
The number of the E_Port and N_Port device records is limited to 768
records for 12-Port Switch, 24-Port Switch, 16-Port 4-Gbps Switch, and
32-Port 4-Gbps Switch. The limit is 252 records for the 140-Port Director. The
limit is 128 records for the 16-Port 2-Gbps Switch, 32-Port 2-Gbps Switch, and
64-Port Director.
In order to add a device to the Authentication Devices list, you must
complete the fields of the CHAP Secret dialog as described in
Applying a CHAP Secret to the Device
on page 5-12. Use the arrow
button between the
CHAP Secret
and
Authentication Devices
areas to
add the device to the Authentication Devices list. The device is
configured to be authenticated immediately after being added to the
list.
The Authenticated Devices list shows the WWN and type of each
device on the list. You can select the devices individually and send
back the
CHAP Secret
dialog for editing using the arrow button. This
does not remove the device from the list.
Removing a Device
from the
Authentication
Devices List
Remove a device from the Authentication Device list by selecting it,
then selecting the
Remove
button. This removes the CHAP secret
configuration from the device.
Attached devices that are removed from the list are re-populated to
the
Attached Devices
dialog. Detached devices that are removed are
permanently deleted from the page.