HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.X Procedures User Guide (AA- - Page 50

Configuring the switch, Displaying the current RADIUS configuration

Page 50 highlights

15.In the Add Remote Access Policy window, confirm that the Conditions section displays the groups that you selected and click Next. 16.After the Add Remote Access Policy window refreshes, select the Grant remote access permission radio button and click Next. 17. After the Add Remote Access Policy window refreshes again, click Edit Profile. 18.In the Edit Dial-in Profile window, select the Authentication tab and then select only the Encrypted Authentication (CHAP) and Unencrypted Authentication (PAP, SPAP) check boxes. 19. Select the Advanced tab and click Add. 20.In the Add Attributes window, select Vendor-Specific and click Add. 21.In the Multivalued Attribute Information window, click Add. 22.In the VSA Information window, select the Enter Vendor Code radio button and enter the value 1588. 23.Select the Yes. It conforms radio button, and then click Configure Attribute. 24.In the Configure VSA (RFC compliant) window, enter the following: a. For the vendor-assigned attribute number, enter the value 1. b. For the attribute format, enter String. c. For the attribute value, enter the login role (root, admin, factory, switchAdmin, or user) the user group must use to log in to the switch. d. Click OK. 25.In the Multivalued Attribute Information window, click OK. 26. In the Edit Dial-in Profile window, remove all additional parameters (except the one you just added, Vendor-Specific) and click OK. 27. In the Add Remote Access Policy window, click Finish. 28.After returning to the Internet Authentication Service window, repeat step 6 through step 27 to add additional policies for all login types you want to use the RADIUS server. After this is done, you can configure the switch. Configuring the switch RADIUS configuration of the switch is controlled by the aaaConfig command. NOTE: On dual-CP switches (Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director), the switch sends its RADIUS request using the IP address of the active CP. When adding clients, add both the active and standby CP IP addresses so that users can still log in to the event of a failover. The following procedures show how to use the aaaConfig command to set up a switch for RADIUS service. Displaying the current RADIUS configuration 1. Connect to the switch and log in as admin. 2. Issue the following command: switch:admin> aaaConfig --show If a configuration exists, its parameters are displayed. If RADIUS service is not configured, only the parameter heading line is displayed. Parameters include: • Position: The order in which servers are contacted to provide service • Server: The server names or IP addresses • Port: The server ports • Secret: The shared secrets • Timeouts: The length of time servers have to respond before the next server is contacted • Authentication: The type of authentication being used on servers 50 Configuring standard security features

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

50
Configuring standard security features
15.
In the Add Remote Access Policy window, confirm that the
Conditions
section displays the groups that
you selected and click
Next
.
16.
After the Add Remote Access Policy window refreshes, select the
Grant remote access permission
radio button and click
Next
.
17.
After the Add Remote Access Policy window refreshes again, click
Edit Profile
.
18.
In the Edit Dial-in Profile window, select the
Authentication
tab and then select only the
Encrypted
Authentication (CHAP)
and
Unencrypted Authentication (PAP, SPAP)
check boxes.
19.
Select the
Advanced
tab and click
Add
.
20.
In the Add Attributes window, select
Vendor-Specific
and click
Add
.
21.
In the Multivalued Attribute Information window, click
Add
.
22.
In the VSA Information window, select the
Enter Vendor Code
radio button and enter the value
1588
.
23.
Select the
Yes. It conforms
radio button, and then click
Configure Attribute
.
24.
In the Configure VSA (RFC compliant) window, enter the following:
a.
For the vendor-assigned attribute number, enter the value
1
.
b.
For the attribute format, enter
String
.
c.
For the attribute value, enter the login role (
root
,
admin
,
factory
,
switchAdmin
, or
user
) the
user group must use to log in to the switch.
d.
Click
OK
.
25.
In the Multivalued Attribute Information window, click
OK
.
26.
In the Edit Dial-in Profile window, remove all additional parameters (except the one you just added,
Vendor-Specific) and click
OK
.
27.
In the Add Remote Access Policy window, click
Finish
.
28.
After returning to the Internet Authentication Service window, repeat
step 6
through
step 27
to add
additional policies for all login types you want to use the RADIUS server. After this is done, you can
configure the switch.
Configuring the switch
RADIUS configuration of the switch is controlled by the
aaaConfig
command.
NOTE:
On dual-CP switches (Core Switch 2/64, SAN Director 2/128, and 4/256 SAN Director), the
switch sends its RADIUS request using the IP address of the active CP. When adding clients, add both the
active and standby CP IP addresses so that users can still log in to the event of a failover.
The following procedures show how to use the
aaaConfig
command to set up a switch for
RADIUS service.
Displaying the current RADIUS configuration
1.
Connect to the switch and log in as admin.
2.
Issue the following command:
switch:admin> aaaConfig --show
If a configuration exists, its parameters are displayed. If RADIUS service is not configured, only the
parameter heading line is displayed. Parameters include:
Position
: The order in which servers are contacted to provide service
Server
: The server names or IP addresses
Port
: The server ports
Secret
: The shared secrets
Timeouts
: The length of time servers have to respond before the next server is contacted
Authentication
: The type of authentication being used on servers