HP StorageWorks 2/24 FW 07.00.00/HAFM SW 08.06.00 McDATA Products in a SAN Env - Page 224

default feature of the Enterprise Operating System E/OS, E_Port and N_Port DHCHAP secrets.

Page 224 highlights

Physical Planning Considerations 5 • RADIUS server support - Remote authentication dial-in user service (RADIUS) is a client-server, UDP-based protocol that supports storage and authentication of passwords and CHAP secrets. Directors, fabric switches, and SAN routers support a RADIUS client (LAN-connected to a primary or secondary RADIUS server) that authenticates CHAP responses and login passwords. The RADIUS server stores: - Management server-to-fabric element (director or fabric switch) CHAP secrets. - E_Port and N_Port DHCHAP secrets. - Hypertext transfer protocol (HTTP) user passwords for the SANpilot interface. - Telnet user passwords for the CLI. - RADIUS server interface encryption keys. • Inband access control list - The management server interface supports an access control list (ACL) that provides attached port worldwide names (WWNs) or switch node names for which director or fabric switch communication is allowed. The CLI and SANpilot interface do not support configuration of an inband access control list. • Out-of-band access control list - Directors and fabric switches support an IP-based ACL that defines the node IP addresses that are permitted to log in to the fabric element through an out-of-band management interface. Each director or fabric switch is individually configured with a list of IP address ranges. • Encrypted SSH protocol - Secure shell (SSH) protocol is a software-enforced security encryption feature that controls CLI access to a director or fabric switch. The SSH protocol suite supports secure shell communication, remote file copy, file transfer, and port forwarding through a telnet interface. • Security log - The security log records security-related events (including but not limited to SANtegrity features). The log is a default feature of the Enterprise Operating System (E/OS) firmware and does not require enablement through a product feature enablement (PFE) key. Log entries record the following events: 5-18 McDATA Products in a SAN Environment - Planning Manual

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322

5
5-18
McDATA Products in a SAN Environment - Planning Manual
Physical Planning Considerations
RADIUS server support -
Remote authentication dial-in user
service (RADIUS) is a client-server, UDP-based protocol that
supports storage and authentication of passwords and CHAP
secrets. Directors, fabric switches, and SAN routers support a
RADIUS client (LAN-connected to a primary or secondary
RADIUS server) that authenticates CHAP responses and login
passwords. The RADIUS server stores:
Management server-to-fabric element (director or fabric
switch) CHAP secrets.
E_Port and N_Port DHCHAP secrets.
Hypertext transfer protocol (HTTP) user passwords for the
SANpilot interface.
Telnet user passwords for the CLI.
RADIUS server interface encryption keys.
Inband access control list -
The management server interface
supports an access control list (ACL) that provides attached port
worldwide names (WWNs) or switch node names for which
director or fabric switch communication is allowed. The CLI and
SANpilot interface do not support configuration of an inband
access control list.
Out-of-band access control list -
Directors and fabric switches
support an IP-based ACL that defines the node IP addresses that
are permitted to log in to the fabric element through an
out-of-band management interface. Each director or fabric switch
is individually configured with a list of IP address ranges.
Encrypted SSH protocol -
Secure shell (SSH) protocol is a
software-enforced security encryption feature that controls CLI
access to a director or fabric switch. The SSH protocol suite
supports secure shell communication, remote file copy, file
transfer, and port forwarding through a telnet interface.
Security log -
The security log records security-related events
(including but not limited to SANtegrity features). The log is a
default feature of the Enterprise Operating System (E/OS)
firmware and does not require enablement through a product
feature enablement (PFE) key. Log entries record the following
events: