HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.3.x administrator guide (569 - Page 132

Managing secret key pairs, secAuthSecret, secAuthSecret --show

Page 132 highlights

To re-authenticate E_Ports: 1. Log in to the switch as admin. 2. On a switch running Fabric OS 5.3.0, type the following command: $authutil --authinit $authutil --authinit 2,3,4 $authutil --authinit allE (all E_ports in the switch) For directors, use the slot/port format for specifying the port number. $authutil --authinit 1/1, 1/2 Managing secret key pairs When you configure the switches at both ends of a link to use DH-CHAP for authentication, you must also define a secret key pair-one for each end of the link. Use the secAuthSecret command to perform the following tasks: • View the WWN of switches with a secret key pair • Set the secret key pair for switches • Remove the secret key pair for one or more switches Note the following characteristics of a secret key pair: • The secret key pair must be set up locally on every switch. The secret key pair are not distributed fabric-wide. • If a secret key pair are not set up for a link, authentication fails. The "Authentication Failed" (reason code 05h) error will be reported and logged. • The minimum length of a shared secret is 8 bytes and the maximum length is 40 bytes. This section illustrates using the secAuthSecret command to display the list of switches in the current switch's shared secret database and to set the secret key pair for the current switch and a connected switch. See the Fabric OS Command Reference for more details on the secAuthSecret command. When setting a secret key pair, note that you are entering the shared secrets in plain text. Use a secure channel (for example, SSH or the serial console) to connect to the switch on which you are setting the secrets. To view the list of secret key pairs in the current switches database: 1. Log in to the switch as admin. 2. On a switch running Fabric OS 4.x or 5.x, type secAuthSecret --show; on a switch running Fabric OS 3.x, type secAuthSecret "--show". The output displays the WWN, domain ID, and name (if known) of the switches with defined shared secrets: WWN DId Name 10:00:00:60:69:80:07:52 Unknown 10:00:00:60:69:80:07:5c 1 switchA 134 Configuring advanced security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465

134
Configuring advanced security
To re-authenticate E_Ports:
1.
Log in to the switch as admin.
2.
On a switch running Fabric OS 5.3.0, type the following command:
$authutil –-authinit
<slot/port_number(s)|allE>
$authutil –-authinit
2,3,4
$authutil –-authinit
allE (all E_ports in the switch)
For directors, use the
slot/port
format for specifying the port number.
$authutil –-authinit
1/1, 1/2
Managing secret key pairs
When you configure the switches at both ends of a link to use DH-CHAP for authentication, you must also
define a
secret key pair
—one for each end of the link. Use the
secAuthSecret
command to perform the
following tasks:
View the WWN of switches with a
secret key pair
Set the
secret key pair
for switches
Remove the
secret key pair
for one or more switches
Note the following characteristics of a
secret key pair
:
The
secret key pair
must be set up locally on every switch. The
secret key pair
are not distributed
fabric-wide.
If a
secret key pair
are not set up for a link, authentication fails. The “Authentication Failed” (reason
code 05h) error will be reported and logged.
The minimum length of a shared secret is 8 bytes and the maximum length is 40 bytes.
This section illustrates using the
secAuthSecret
command to display the list of switches in the current
switch’s shared secret database and to set the
secret key pair
for the current switch and a connected switch.
See the
Fabric OS Command Reference
for more details on the
secAuthSecret
command.
When setting a
secret key pair
, note that you are entering the shared secrets in plain text. Use a secure
channel (for example, SSH or the serial console) to connect to the switch on which you are setting the
secrets.
To view the list of secret key pairs in the current switches database:
1.
Log in to the switch as admin.
2.
On a switch running Fabric OS 4.x or 5.x, type
secAuthSecret --show
; on a switch running
Fabric OS 3.x, type
secAuthSecret "
--
show"
.
The output displays the WWN, domain ID, and name (if known) of the switches with defined shared
secrets:
WWN
DId
Name
-----------------------------------------------
10:00:00:60:69:80:07:52
Unknown
10:00:00:60:69:80:07:5c
1
switchA