HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.X Procedures User Guide (AA- - Page 52

Enabling and disabling local authentication, Configuring for the SSL protocol

Page 52 highlights

-p port Is an optional argument; enter a server port. -s secret Is an optional argument; enter a shared secret. -t timeout Is an optional argument; enter the length of time (in seconds) the server has to respond before the next server is contacted. -a[pap|chap] Specifies PAP or CHAP as authentication protocol. Changing the order in which RADIUS servers are contacted for service 1. Connect to the switch and log in as admin. 2. Issue the following command: switch:admin> aaaConfig --move server to_position where: server Is a list of servers by either name or IP address. Enter either the name or IP address of the server whose position is to be changed. to_position Is the position number to which the server is to be moved. When the command succeeds, the event log indicates that a server configuration is changed. Enabling and disabling local authentication It is useful to enable local authentication so that the switch can take over authentication locally if the RADIUS servers fail to respond because of power outage or network problems. To enable or disable local authentication, issue the following command: switch:admin> aaaConfig --switchdb on | off Specifying on enables local authentication; specifying off disables it. When local authentication is enabled and RADIUS servers fail to respond, you can log in to the default switch accounts (admin and user) or any user-defined account. You must know the passwords of these accounts. RADIUS authentication must be enabled when local database authentication is turned off from the on state; otherwise, an error is returned. Because local database authentication might be disabled or enabled when enabling or disabling RADIUS authentication, set the local database authentication explicitly to enabled or disabled after setting the desired RADIUS authentication configuration. When the command succeeds, the event log indicates that local database authentication is disabled or enabled. Configuring for the SSL protocol Fabric OS 4.4.0 and later support SSL protocol, which provides secure access to a fabric through Web-based management tools like Advanced Web Tools. SSL support is a standard Fabric OS feature; it is independent of Secure Fabric OS, which requires a license and separate certification. Switches configured for SSL grant access to management tools through hypertext transfer protocol-secure links (which begin with https://) instead of standard links (which begin with http://). SSL uses public key infrastructure (PKI) encryption to protect data transferred over SSL connections. PKI is based on digital certificates obtained from an Internet Certificate Authority (CA), which acts as the trusted key agent. Certificates are based on the switch IP address or fully-qualified domain name (FQDN), depending on the issuing CA. If you change a switch IP address or FQDN after activating an associated certificate, you might have to obtain and install a new certificate. Check with the CA to verify this possibility, and plan these types of changes accordingly. 52 Configuring standard security features

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

52
Configuring standard security features
Changing the order in which RADIUS servers are contacted for service
1.
Connect to the switch and log in as admin.
2.
Issue the following command:
switch:admin> aaaConfig --move
server
to_position
When the command succeeds, the event log indicates that a server configuration is changed.
Enabling and disabling local authentication
It is useful to enable local authentication so that the switch can take over authentication locally if the
RADIUS servers fail to respond because of power outage or network problems. To enable or disable local
authentication, issue the following command:
switch:admin> aaaConfig --switchdb on | off
Specifying
on
enables local authentication; specifying
off
disables it.
When local authentication is enabled and RADIUS servers fail to respond, you can log in to the default
switch accounts (admin and user) or any user-defined account. You must know the passwords of these
accounts.
RADIUS authentication must be enabled when local database authentication is turned off from the on
state; otherwise, an error is returned.
Because local database authentication might be disabled or enabled when enabling or disabling RADIUS
authentication, set the local database authentication explicitly to enabled or disabled after setting the
desired RADIUS authentication configuration.
When the command succeeds, the event log indicates that local database authentication is disabled
or enabled.
Configuring for the SSL protocol
Fabric OS 4.4.0 and later support SSL protocol, which provides secure access to a fabric through
Web-based management tools like Advanced Web Tools. SSL support is a standard Fabric OS feature; it
is independent of Secure Fabric OS, which requires a license and separate certification.
Switches configured for SSL grant access to management tools through hypertext transfer protocol-secure
links (which begin with
https://
) instead of standard links (which begin with
http://
).
SSL uses public key infrastructure (PKI) encryption to protect data transferred over SSL connections. PKI is
based on digital certificates obtained from an Internet Certificate Authority (CA), which acts as the trusted
key agent.
Certificates are based on the switch IP address or fully-qualified domain name (FQDN), depending on the
issuing CA. If you change a switch IP address or FQDN after activating an associated certificate, you
might have to obtain and install a new certificate. Check with the CA to verify this possibility, and plan
these types of changes accordingly.
-p
port
Is an optional argument; enter a server port.
-s
secret
Is an optional argument; enter a shared secret.
-t
timeout
Is an optional argument; enter the length of time (in seconds) the server
has to respond before the next server is contacted.
-a[pap|chap]
Specifies
PAP
or
CHAP
as authentication protocol.
where:
server
Is a list of servers by either name or IP address. Enter either the name or IP
address of the server whose position is to be changed.
to_position
Is the position number to which the server is to be moved.