HP StorageWorks 2/24 FW 07.00.00/HAFM SW 08.06.00 McDATA Products in a SAN Env - Page 223

Manager EFCM, SANavigator, CLI, and SANpilot management, Port DHCHAP authentication, CT authentication

Page 223 highlights

Physical Planning Considerations 5 The fabric element transmits a random value (used only once), an ID value (incremented at each login), and a shared CHAP secret (16-byte random value) to the server. The server concatenates the random value, ID value, and CHAP secret, and calculates a oneway message digest (also called a hash value). The hash value is transmitted to the authenticator (fabric element). The fabric element then builds the same concatenated string and compares the result with the value received from the server. If the values match, the connection is authenticated. • Port DHCHAP authentication - Enhanced security for device connections and ISLs is provided through Diffie-Hellman challenge handshake authentication protocol (DHCHAP). A fabric element uses DHCHAP to authenticate any device (node) that attempts a node port (N_Port) connection and any director or switch that attempts an expansion port (E_Port) connection. This ensures only authorized devices can be added to the fabric. DHCHAP is an authentication protocol based on transmission of a one-way hash value (comprised of a sequentially-incremented ID value and CHAP secret). Because the hash cannot be reversed to discover the CHAP secret, the protocol provides protection from discovery through the network. • CT authentication - Common transport (CT) authentication authorizes management server access to fabric elements through the open-system management server (OSMS) interface. The feature is software-enforced and allows an attached fabric to authenticate the OSMS management application. A single shared secret is configured for each fabric-attached director or switch (because OSMS is a fabric service that assumes all attached fabric elements are authenticated). The same secret is used by the management application. • PCP user database - All authentication users are configured in a product control point (PCP) user database. The database includes usernames, passwords, and authorized interfaces for management server and device access. The database controls password authentication for Enterprise Fabric Connectivity Manager (EFCM), SANavigator, CLI, and SANpilot management interfaces. The database also controls CHAP and CT authentication for Fibre Channel ports. Physical Planning Considerations 5-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

5
Physical Planning Considerations
5-17
Physical Planning Considerations
The fabric element transmits a random value (used only once), an
ID value (incremented at each login), and a shared CHAP secret
(16-byte random value) to the server. The server concatenates the
random value, ID value, and CHAP secret, and calculates a one-
way message digest (also called a hash value). The hash value is
transmitted to the authenticator (fabric element). The fabric
element then builds the same concatenated string and compares
the result with the value received from the server. If the values
match, the connection is authenticated.
Port DHCHAP authentication -
Enhanced security for device
connections and ISLs is provided through Diffie-Hellman
challenge handshake authentication protocol (DHCHAP). A
fabric element uses DHCHAP to authenticate any device (node)
that attempts a node port (N_Port) connection and any director or
switch that attempts an expansion port (E_Port) connection. This
ensures only authorized devices can be added to the fabric.
DHCHAP is an authentication protocol based on transmission of
a one-way hash value (comprised of a sequentially-incremented
ID value and CHAP secret). Because the hash cannot be reversed
to discover the CHAP secret, the protocol provides protection
from discovery through the network.
CT authentication -
Common transport (CT) authentication
authorizes management server access to fabric elements through
the open-system management server (OSMS) interface. The
feature is software-enforced and allows an attached fabric to
authenticate the OSMS management application. A single shared
secret is configured for each fabric-attached director or switch
(because OSMS is a fabric service that assumes all attached fabric
elements are authenticated). The same secret is used by the
management application.
PCP user database -
All authentication users are configured in a
product control point (PCP) user database. The database includes
usernames, passwords, and authorized interfaces for
management server and device access. The database controls
password authentication for Enterprise Fabric Connectivity
Manager (EFCM), SANavigator, CLI, and SANpilot management
interfaces. The database also controls CHAP and CT
authentication for Fibre Channel ports.