HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.3.x administrator guide (569 - Page 232

Configuring Secure Fabric OS DH-CHAP secret, portShow, portCfgEXPort, secAuthSecret

Page 232 highlights

fabrics. Secure Fabric OS is an optional licensed product that provides customizable security restrictions through local and remote management channels on a Brocade fabric. The FC-FC Routing Service uses only the DH-CHAP shared secrets to provide switch-to-switch authentication when connecting to a Secure Fabric OS fabric. You can set up DH-CHAP on the edge fabric, but it is not a prerequisite for FCR to work. To determine whether an EX_Port or VEX_Port is connected to a Secure Fabric OS fabric, enter the portShow, portCfgEXPort, or portCfgVEXPort command, as described in the Fabric OS Command Reference Manual. Note that you should issue these commands only after the IFLs have been configured for the EX- and VEX_Ports and the FCIP tunnels are up and running. For more details, see Configuring an interfabric link, page 239 and Configuring FCIP tunnels (Optional), page 237. Configuring Secure Fabric OS DH-CHAP secret While Secure Fabric OS supports the SLAP, FCAP and DH-CHAP authentication protocols to communicate with each switch, Fabric OS v5.3 (and Fabric OS v5.1.0 and v5.2 0) supports only DH-CHAP. The 400 MP Router and 4/256 SAN Director with a B-Series MP Router blade do not initiate DH-CHAP authentication requests; rather, they respond to DH-CHAP requests only from the edge switch to which they are connected-in this case, the Secure Fabric OS switch. As soon as you connect the 400 MP Router and 4/256 SAN Director with a B-Series MP Router blade to a Secure Fabric OS switch, DH-CHAP authentication is initiated. The DH-CHAP secrets are configured both on the Secure Fabric OS switch and the B400 MP Router and 4/256 SAN Director with a B-Series MP Router blade. Each entry specifies the WWN of the peer to which it is connected. For example, on the 400 MP Router and 4/256 SAN Director with a B-Series MP Router blade, specify the WWN of the Secure Fabric OS switch and the secrets. On the Secure Fabric OS switch, specify the WWN of the front domain (EX_Port or VEX_Port) and the secrets. To view the front domain WWN, issue the portCfgEXPort command on the Fibre Channel router side. The WWN of the front domain (EX_Port or VEX_Port) that is connected to the Secure Fabric OS switch should be present in the Switch Connection Controls (SCC) list. See the Secure Fabric OS Administrator's Guide for details about the SCC and other Secure Fabric OS features. To configure a DH-CHAP secret word 1. Log in to the 4/256 SAN Director with a B-Series MP Router blade with administrative privileges. 2. At the Telnet prompt, enter the secAuthSecret command. The secret must be between 8 and 40 characters long. Setting up secret keys does not initiate DH-CHAP authentication. DH-CHAP authentication is performed whenever a port or a switch is enabled. 3. Follow the instructions provided on screen, as shown in the following example. a. Type the port or switch WWN. Use only the WWN as the input. The domain ID or switch name is not acceptable. b. Type and confirm the peer secret. c. Type and confirm the local secret. 4. After you have added all of the DH-CHAP secret information, press Enter to indicate that you have completed the secret key setup. 5. When prompted, type y. The DH-CHAP secret is now stored in the secret word database and is ready for use. switch:admin> secauthsecret --set This command is used to set up secret keys for the DH-CHAP authentication. The minimum length of a secret key is 8 characters and maximum 40 characters. Setting up secret keys does not initiate DH-CHAP authentication. If switch is configured to do DH-CHAP, it is performed whenever a port or a switch is enabled. Warning: Please use a secure channel for setting secrets. Using an insecure channel is not safe and may compromise secrets. 234 Using the FC-FC routing service

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465

234
Using the FC-FC routing service
fabrics. Secure Fabric OS is an optional licensed product that provides customizable security restrictions
through local and remote management channels on a Brocade fabric.
The FC-FC Routing Service uses only the DH-CHAP shared secrets to provide switch-to-switch authentication
when connecting to a Secure Fabric OS fabric. You can set up DH-CHAP on the edge fabric, but it is not a
prerequisite for FCR to work.
To determine whether an EX_Port or VEX_Port is connected to a Secure Fabric OS fabric, enter the
portShow
,
portCfgEXPort
,
or
portCfgVEXPort
command, as described in the Fabric OS
Command Reference Manual. Note that you should issue these commands only after the IFLs have been
configured for the EX- and VEX_Ports and the FCIP tunnels are up and running. For more details, see
Configuring an interfabric link
, page 239 and
Configuring FCIP tunnels (Optional)
, page 237.
Configuring Secure Fabric OS DH-CHAP secret
While Secure Fabric OS supports the SLAP, FCAP and DH-CHAP authentication protocols to communicate
with each switch, Fabric OS v5.3 (and Fabric OS v5.1.0 and v5.2 0) supports only DH-CHAP.
The 400 MP Router and 4/256 SAN Director with a B-Series MP Router blade do not initiate DH-CHAP
authentication requests; rather, they respond to DH-CHAP requests only from the edge switch to which they
are connected—in this case, the Secure Fabric OS switch.
As soon as you connect the 400 MP Router and 4/256 SAN Director with a B-Series MP Router blade to a
Secure Fabric OS switch, DH-CHAP authentication is initiated.
The DH-CHAP secrets are configured both on the Secure Fabric OS switch and the B400 MP Router and
4/256 SAN Director with a B-Series MP Router blade. Each entry specifies the WWN of the peer to which
it is connected. For example, on the 400 MP Router and 4/256 SAN Director with a B-Series MP Router
blade, specify the WWN of the Secure Fabric OS switch and the secrets. On the Secure Fabric OS switch,
specify the WWN of the front domain (EX_Port or VEX_Port) and the secrets. To view the front domain
WWN, issue the
portCfgEXPort
command on the Fibre Channel router side.
The WWN of the front domain (EX_Port or VEX_Port) that is connected to the Secure Fabric OS switch
should be present in the Switch Connection Controls (SCC) list. See the
Secure Fabric OS Administrator’s
Guide
for details about the SCC and other Secure Fabric OS features.
To configure a DH-CHAP secret word
1.
Log in to the 4/256 SAN Director with a B-Series MP Router blade with administrative privileges.
2.
At the Telnet prompt, enter the
secAuthSecret
command. The secret must be between 8 and 40
characters long.
Setting up secret keys does not initiate DH-CHAP authentication. DH-CHAP authentication is performed
whenever a port or a switch is enabled.
3.
Follow the instructions provided on screen, as shown in the following example.
a.
Type the port or switch WWN.
Use only the WWN as the input. The domain ID or switch name is not acceptable.
b.
Type and confirm the peer secret.
c.
Type and confirm the local secret.
4.
After you have added all of the DH-CHAP secret information, press
Enter
to indicate that you have
completed the secret key setup.
5.
When prompted, type
y
. The DH-CHAP secret is now stored in the secret word database and is ready
for use.
switch:admin>
secauthsecret --set
This command is used to set up secret keys for the DH-CHAP authentication.
The minimum length of a secret key is 8 characters and maximum 40
characters. Setting up secret keys does not initiate DH-CHAP
authentication. If switch is configured to do DH-CHAP, it is performed
whenever a port or a switch is enabled.
Warning: Please use a secure channel for setting secrets. Using
an insecure channel is not safe and may compromise secrets.