HP StorageWorks 8/80 HP StorageWorks Fabric OS 6.1.x administrator guide (5697 - Page 120

Managing secret key pairs

Page 120 highlights

2. On a switch running Fabric OS 4.x or 5.x, type authUtil --set -a dhchap; on a switch running Fabric OS 3.x, type authUtil "--set -a dhchap". Output similar to the following is displayed: Authentication is set to dhchap. When using DH-CHAP, make sure that you configure the switches at both ends of a link. NOTE: If you set the authentication protocol to DH-CHAP, have not yet configured shared secrets, and authentication is checked (for example, you enable the switch), switch authentication fails. Re-authenticating ports Use the command authutil to re-initiate the authentication on selected ports. It provides flexibility to initiate authentication for specified E_Ports, set of E_Ports, and all E_Ports on the switch. This command will not work on Private, Loop, NPIV and FICON devices. The command authutil can re-initiate authentication only if the device was previously authenticated. If the authentication fails because shared secrets do not match, the port is disabled. This command works independently of the authentication policy; this means you can initiate the authentication even if the switch is in PASSIVE mode. This command is used to restart authentication after changing the DH-CHAP group, hash type, and shared secret between a pair of switches. WARNING! This command may bring down the E_Port(s) if the DH-CHAP shared secrets are not installed correctly. To re-authenticate E_Ports: 1. Log in to the switch using an account assigned to the admin role. 2. On a switch running Fabric OS 5.3.0 and later, type the following command: $authutil --authinit Example $authutil --authinit 2,3,4 Example $authutil --authinit allE (all E_ports in the switch) For directors, use the slot/port format for specifying the port number. Example $authutil --authinit Managing secret key pairs 1/1, 1/2 When you configure the switches at both ends of a link to use DH-CHAP for authentication, you must also define a secret key pair-one for each end of the link. Use the secAuthSecret command to perform the following tasks: • View the WWN of switches with a secret key pair • Set the secret key pair for switches • Remove the secret key pair for one or more switches Note the following characteristics of a secret key pair: • The secret key pair must be set up locally on every switch. The secret key pair are not distributed fabric-wide. • If a secret key pair are not set up for a link, authentication fails. The "Authentication Failed" (reason code 05h) error will be reported and logged. • The minimum length of a shared secret is 8 bytes and the maximum length is 40 bytes. 120 Configuring advanced security features

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492

120
Configuring advanced security features
2.
On a switch running Fabric OS 4.x or 5.x, type
authUtil --set -a dhchap
; on a switch running
Fabric OS 3.x, type
authUtil "
--
set -a dhchap"
.
Output similar to the following is displayed:
Authentication is set to dhchap.
When using DH-CHAP, make sure that you configure the switches at both ends of a link.
NOTE:
If you set the authentication protocol to DH-CHAP, have not yet configured shared secrets, and
authentication is checked (for example, you enable the switch), switch authentication fails.
Re-authenticating ports
Use the command
authutil
to re-initiate the authentication on selected ports. It provides flexibility to
initiate authentication for specified E_Ports, set of E_Ports, and all E_Ports on the switch. This command will
not work on Private, Loop, NPIV and FICON devices. The command
authutil
can re-initiate
authentication only if the device was previously authenticated. If the authentication fails because shared
secrets do not match, the port is disabled.
This command works independently of the authentication policy; this means you can initiate the
authentication even if the switch is in PASSIVE mode. This command is used to restart authentication after
changing the DH-CHAP group, hash type, and shared secret between a pair of switches.
WARNING!
This command may bring down the E_Port(s) if the DH-CHAP shared secrets are not installed
correctly
.
To re-authenticate E_Ports:
1.
Log in to the switch using an account assigned to the admin role.
2.
On a switch running Fabric OS 5.3.0 and later, type the following command:
$authutil –-authinit
<slot/port_number(s)|allE>
Example
$authutil –-authinit
2,3,4
Example
$authutil –-authinit
allE (all E_ports in the switch)
For directors, use the
slot/port
format for specifying the port number.
Example
$authutil –-authinit
1/1, 1/2
Managing secret key pairs
When you configure the switches at both ends of a link to use DH-CHAP for authentication, you must also
define a
secret key pair
—one for each end of the link. Use the
secAuthSecret
command to perform the
following tasks:
View the WWN of switches with a
secret key pair
Set the
secret key pair
for switches
Remove the
secret key pair
for one or more switches
Note the following characteristics of a
secret key pair
:
The
secret key pair
must be set up locally on every switch. The
secret key pair
are not distributed
fabric-wide.
If a
secret key pair
are not set up for a link, authentication fails. The “Authentication Failed” (reason
code 05h) error will be reported and logged.
The minimum length of a shared secret is 8 bytes and the maximum length is 40 bytes.