HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.X Procedures User Guide (AA- - Page 39

Configuring standard security features, Secure protocols, Table 4 Secure protocol support

Page 39 highlights

3 Configuring standard security features This chapter provides information and procedures for configuring standard Fabric OS security features such as account and password management. Additional security features are available when secure mode is enabled. For information about licensed security features available in Secure Fabric OS, see the HP StorageWorks Secure Fabric OS administrator guide. Secure protocols Fabric OS supports the secure protocols shown in Table 4. T, able 4 Secure protocol support Protocol Description Secure Sockets Layer (SSL) HTTPS Secure File Copy (scp) SNMPv3 Supports SSLv3, 128-bit encryption by default. Fabric OS uses SSL to support HTTPS. A certificate must be generated and installed on each switch to enable SSL. Advanced Web Tools supports the use of HTTPS. Configuration upload and download support the use of scp. SNMPv1 is also supported. SNMP is a standard method for monitoring and managing network devices. Using SNMP components, you can program tools to view, browse, and manipulate HP StorageWorks switch variables and set up enterprise-level management processes. Every HP StorageWorks switch carries an SNMP agent and Management Information Base (MIB). The agent accesses MIB information about a device and makes it available to a network manager station. You can manipulate information of your choice by trapping MIB elements using the Fabric OS CLI, Advanced Web Tools, or Fabric Manager. The SNMP Access Control List (ACL) provides a way for you to restrict SNMP get and set operations to certain hosts and IP addresses. This is used for enhanced management security in the SAN. For details on HP StorageWorks MIB files, naming conventions, loading instructions, and information about using the HP SNMP agent, see the HP StorageWorks Fabric OS 5.x MIB reference guide. Table 5 describes additional software or certificates that you must obtain to deploy secure protocols. Table 5 Items needed to deploy secure protocols Protocol Host side Switch side Secure telnet (sectelnet) Secure Shell (SSH) HTTPS Secure File Copy (scp) SNMPv3, SNMPv1 Sectelnet client SSH client No requirement on host side except a browser that supports HTTPS SSH daemon, scp server None License not required, but a switch certificate issued by HP is required None Switch IP certificate for SSL None None The security protocols are designed with the four main usage cases described in Table 6. Fabric OS 5.x administrator guide 39

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

Fabric OS 5.x administrator guide
39
3
Configuring standard security features
This chapter provides information and procedures for configuring standard Fabric OS security features
such as account and password management.
Additional security features are available when secure mode is enabled. For information about licensed
security features available in Secure Fabric OS, see the
HP StorageWorks Secure Fabric OS administrator
guide
.
Secure protocols
Fabric OS supports the secure protocols shown in
Table 4
.
,
SNMP is a standard method for monitoring and managing network devices. Using SNMP components,
you can program tools to view, browse, and manipulate HP StorageWorks switch variables and set up
enterprise-level management processes.
Every HP StorageWorks switch carries an SNMP agent and Management Information Base (MIB). The
agent accesses MIB information about a device and makes it available to a network manager station. You
can manipulate information of your choice by trapping MIB elements using the Fabric OS CLI, Advanced
Web Tools, or Fabric Manager.
The SNMP Access Control List (ACL) provides a way for you to restrict SNMP get and set operations to
certain hosts and IP addresses. This is used for enhanced management security in the SAN.
For details on HP StorageWorks MIB files, naming conventions, loading instructions, and information
about using the HP SNMP agent, see the
HP StorageWorks Fabric OS 5.x MIB reference guide
.
Table 5
describes additional software or certificates that you must obtain to deploy secure protocols.
The security protocols are designed with the four main usage cases described in
Table 6
.
Table 4
Secure protocol support
Protocol
Description
Secure Sockets Layer (SSL)
Supports SSLv3, 128-bit encryption by default. Fabric OS uses SSL to support
HTTPS. A certificate must be generated and installed on each switch to enable
SSL.
HTTPS
Advanced Web Tools supports the use of HTTPS.
Secure File Copy (scp)
Configuration upload and download support the use of scp.
SNMPv3
SNMPv1 is also supported.
Table 5
Items needed to deploy secure protocols
Protocol
Host side
Switch side
Secure telnet (sectelnet)
Sectelnet client
License not required, but a switch certificate
issued by HP is required
Secure Shell (SSH)
SSH client
None
HTTPS
No requirement on host
side except a browser that
supports HTTPS
Switch IP certificate for SSL
Secure File Copy (scp)
SSH daemon, scp server
None
SNMPv3, SNMPv1
None
None