HP 8/20q HP StorageWorks 8/20q Fibre Channel Switch Command Line Interface Gui - Page 148

group, Table 8 ISL group member attributes, Handshake Authentication Protocol CHAP. The default is

Page 148 highlights

group Description Creates groups, manages membership within the group, and manages the membership of groups in security sets. Authority Admin session and a Security Edit session. For information about starting a Security Edit session, see the security command. The list, members, securitysets, and type operands are available without an Admin session. Syntax group add [group] copy [group_source] [group_destination] create [group] [type] delete [group] edit [group] [member] list members [group] remove [group] [member_list] rename [group_old] [group_new] securitysets [group] type [group] Operands add [group] Initiates an editing session in which to specify a group member and its attributes for the existing group given by [group]. ISL, Port, and MS member attributes are described in Table 8, Table 9, and Table 10 respectively. The group name and group type attributes are read-only fields common to all three tables. Table 8 ISL group member attributes Attribute Member Authentication PrimaryHash PrimarySecret SecondaryHash Description Worldwide name of the switch that would attach to the switch. A member cannot belong to more than one group. Enables (Chap) or disables (None) authentication using the Challenge Handshake Authentication Protocol (CHAP). The default is None. The preferred hash function to use to decipher the encrypted primary secret sent by the ISL member. The hash functions are MD5 or SHA-1. If the ISL member does not support the primary hash, the switch will use the secondary hash. Hexadecimal string that is encrypted by the primary hash for authentication with the ISL group member. The string has the following lengths depending on the primary hash function: • MD5 hash: 16-byte • SHA-1 hash: 20-byte Hash function to use to decipher the encrypted secondary secret sent by the ISL group member. Hash values are MD5 or SHA-1. The secondary hash is used when the primary hash is not available on the ISL group member. The primary hash and the secondary hash cannot be the same. 148 Command Reference

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330

148
Command Reference
group
Description
Creates groups, manages membership within the group, and manages the membership of groups in
security sets.
Authority
Admin session and a Security Edit session. For information about starting a Security Edit session, see
the
security
command. The
list
,
members
,
securitysets
, and
type
operands are
available without an Admin session.
Syntax
group
add [group]
copy [group_source] [group_destination]
create [group]
[type]
del
ete [group]
edit [group] [member]
list
members [group]
remove [group] [member_list]
rename [group_old] [group_new]
securitysets [group]
type [group]
Operands
add [group]
Initiates an editing session in which to specify a group member and its attributes for the existing
group given by [group]. ISL, Port, and MS member attributes are described in
Table 8
,
Table 9
,
and
Table 10
respectively. The group name and group type attributes are read-only fields
common to all three tables.
Table 8
ISL group member attributes
Attribute
Description
Member
Worldwide name of the switch that would attach to the switch. A member
cannot belong to more than one group.
Authentication
Enables (
Chap
) or disables (
None
) authentication using the Challenge
Handshake Authentication Protocol (CHAP). The default is
None
.
PrimaryHash
The preferred hash function to use to decipher the encrypted primary secret
sent by the ISL member. The hash functions are MD5 or SHA-1. If the ISL
member does not support the primary hash, the switch will use the
secondary hash.
PrimarySecret
Hexadecimal string that is encrypted by the primary hash for
authentication with the ISL group member. The string has the following
lengths depending on the primary hash function:
MD5 hash: 16-byte
SHA-1 hash: 20-byte
SecondaryHash
Hash function to use to decipher the encrypted secondary secret sent by
the ISL group member. Hash values are
MD5
or
SHA-1
. The secondary
hash is used when the primary hash is not available on the ISL group
member. The primary hash and the secondary hash cannot be the same.