HP 8/20q HP StorageWorks 8/20q Fibre Channel Switch Command Line Interface Gui - Page 148
group, Table 8 ISL group member attributes, Handshake Authentication Protocol CHAP. The default is
View all HP 8/20q manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 148 highlights
group Description Creates groups, manages membership within the group, and manages the membership of groups in security sets. Authority Admin session and a Security Edit session. For information about starting a Security Edit session, see the security command. The list, members, securitysets, and type operands are available without an Admin session. Syntax group add [group] copy [group_source] [group_destination] create [group] [type] delete [group] edit [group] [member] list members [group] remove [group] [member_list] rename [group_old] [group_new] securitysets [group] type [group] Operands add [group] Initiates an editing session in which to specify a group member and its attributes for the existing group given by [group]. ISL, Port, and MS member attributes are described in Table 8, Table 9, and Table 10 respectively. The group name and group type attributes are read-only fields common to all three tables. Table 8 ISL group member attributes Attribute Member Authentication PrimaryHash PrimarySecret SecondaryHash Description Worldwide name of the switch that would attach to the switch. A member cannot belong to more than one group. Enables (Chap) or disables (None) authentication using the Challenge Handshake Authentication Protocol (CHAP). The default is None. The preferred hash function to use to decipher the encrypted primary secret sent by the ISL member. The hash functions are MD5 or SHA-1. If the ISL member does not support the primary hash, the switch will use the secondary hash. Hexadecimal string that is encrypted by the primary hash for authentication with the ISL group member. The string has the following lengths depending on the primary hash function: • MD5 hash: 16-byte • SHA-1 hash: 20-byte Hash function to use to decipher the encrypted secondary secret sent by the ISL group member. Hash values are MD5 or SHA-1. The secondary hash is used when the primary hash is not available on the ISL group member. The primary hash and the secondary hash cannot be the same. 148 Command Reference