HP 8/20q HP StorageWorks 8/20q and SN6000 Fibre Channel Switch Enterprise Fabr - Page 73

Creating a security group member

Page 73 highlights

5. Select a security group type from the Security Group Type drop-down menu. A security set is limited to one group of each type. • ISL for secure connections to other switches • Port for secure connections to devices • MS for secure connections to devices that issue management server commands. 6. Click OK to save the change. 7. Click Apply to display the Save Security dialog box. 8. Click Save Security to apply changes to switch. 9. In the Security Set Activation dialog box, click Yes to save and activate the security set, or click No to save the security set without activation. 10. Click Close to close the Save Security dialog box. IMPORTANT: Activating a security set with an empty security group prevents all connections for that security group type. For example, an empty ISL security group causes the switch to reject all logins from other switches. Creating a security group member To create a group member and add it to a security group: 1. Select the entry switch in the fabric tree. 2. Click Security on the toolbar, or select Security > Edit Security to open the Edit Security dialog box (Figure 31). 3. Choose one of the following methods to open the Create a Security Group Member dialog box (Figure 37): • In the graphic window, select a security group, and click Security Member in the toolbar. • Right-click on a security group, and select Create Members from the popup menu. • In the graphic window, select a security group, and select Edit > Create Members. Figure 37 Create a Security Group Member dialog box 4. Open the Group Member drop-down list, and select a node World Wide Name. The switch must be a member of any group in which authentication is used. You can type a 16-character hex World Wide Name, or a 23-character WWN with the format xx:xx:xx:xx:xx:xx:xx:xx. 5. Open the Authentication drop-down list, and select the authentication protocol for that member: None (zero bytes) or Chap (16 bytes). 6. If the authentication protocol is Chap, choose a primary hash algorithm and type a primary secret. You can also click Generate to create a random primary secret. Re-type the primary secret in the Confirm Primary field. 7. If the authentication protocol is Chap, choose a secondary hash algorithm and type a secondary secret. If the primary hash is not supported on the initiator, the secondary hash and secret are used. HP StorageWorks 8/20q and SN6000 Fibre Channel Switch Enterprise Fabric Management Suite User Guide 73

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

HP StorageWorks 8/20q and SN6000 Fibre Channel Switch Enterprise Fabric Management Suite User Guide
73
5.
Select a security group type from the Security Group Type drop-down menu. A security set is limited to
one group of each type.
ISL for secure connections to other switches
Port for secure connections to devices
MS for secure connections to devices that issue management server commands.
6.
Click
OK
to save the change.
7.
Click
Apply
to display the Save Security dialog box.
8.
Click
Save Security
to apply changes to switch.
9.
In the Security Set Activation dialog box, click
Yes
to save and activate the security set, or click
No
to
save the security set without activation.
10.
Click
Close
to close the Save Security dialog box.
IMPORTANT:
Activating a security set with an empty security group prevents all connections for that
security group type. For example, an empty ISL security group causes the switch to reject all logins from
other switches.
Creating a security group member
To create a group member and add it to a security group:
1.
Select the entry switch in the fabric tree.
2.
Click
Security
on the toolbar, or select
Security > Edit Security
to open the Edit Security dialog box
(
Figure 31
).
3.
Choose one of the following methods to open the Create a Security Group Member dialog box
(
Figure 37
):
In the graphic window, select a security group, and click
Security Member
in the toolbar.
Right-click on a security group, and select
Create Members
from the popup menu.
In the graphic window, select a security group, and select
Edit > Create Members
.
Figure 37
Create a Security Group Member dialog box
4.
Open the Group Member drop-down list, and select a node World Wide Name. The switch must be a
member of any group in which authentication is used. You can type a 16-character hex World Wide
Name, or a 23-character WWN with the format
xx:xx:xx:xx:xx:xx:xx:xx
.
5.
Open the Authentication drop-down list, and select the authentication protocol for that member: None
(zero bytes) or Chap (16 bytes).
6.
If the authentication protocol is Chap, choose a primary hash algorithm and type a primary secret. You
can also click
Generate
to create a random primary secret. Re-type the primary secret in the Confirm
Primary field.
7.
If the authentication protocol is Chap, choose a secondary hash algorithm and type a secondary
secret. If the primary hash is not supported on the initiator, the secondary hash and secret are used.