HP StorageWorks 8/80 HP StorageWorks Fabric OS 6.2 administrator guide (5697-0 - Page 131

E_Port authentication

Page 131 highlights

The AUTH policy is designed to accommodate mixed fabric environments that contain Fabric OS 6.0.0 and later along with pre-6.0.0 switches. The policy states PASSIVE and OFF allow connection from Fabric OS 6.0.0 and later switches to pre-6.0.0 switches. These policy states do not allow switches to send the authentication negotiation and therefore continue with the rest of port initialization. Virtual Fabric considerations: If a Virtual Fabric is enabled, all AUTH module parameters such as shared secrets, and shared switch and device policies, are Logical Switch-wide. That means you must configure shared secrets and policies separately on each Logical Switch and the shared secrets and policies must be set on each switch prior to authentication. On Logical Switch creation, authentication takes default values for policies and other parameters. E_Port authentication The authentication (AUTH) policy allows you to configure DH-CHAP authentication on the switch. By default the policy is set to PASSIVE and you can change the policy using the authUtil command. All changes to the AUTH policy take effect during the next authentication request. This includes starting authentication on all E_Ports on the local switch if the policy is changed to ON or ACTIVE, and clearing the authentication if the policy is changed to OFF. The authentication configurations will be effective only on subsequent E_ and F_Port initialization. Virtual Fabric considerations: The switch authentication policy applies to all E_Ports in a Logical Switch. This includes ISLs and extended ISLs. Authentication of extended ISLs between two base switches is considered peer-chassis authentication. Authentication between two physical entities is required, so the extended ISL that connects the two chassis needs to be authenticated. The corresponding extended ISL for a logical ISL authenticates the peer-chassis, therefore the logical ISL authentication is not required. Since the logical ISLs do not carry actual traffic, they do not need to be authenticated. Authentication on re-individualization is also blocked on logical ISLs. The following error message is printed on the console when you execute the authUtil --authinit command on logical-ISLs, Failed to initiate authentication. Authentication is not supported on logical ports . For more information on Virtual Fabrics, see Chapter 6, "Managing virtual fabrics" on page 173. A secret key pair has to be installed prior to changing the policy. The policy can be configured as follows: switch:admin> authutil --policy -sw IMPORTANT: If data input has not been completed and a failover occurs, the command is terminated without completion and your entire input is lost. If a failover occurs and data input has been completed and the Enter key pressed, data may or may not be replicated to the other CP depending on the timing of the failover. Log in to the other CP after the failover is complete and verify that the data was saved. If data was not saved, run the command again. The following are the available policy modes and properties: ON Setting the AUTH policy to ON means that strict authentication is enforced on all E_Ports. If the connecting switch does not support authentication or the policy is switched to the OFF state, the ISL is disabled. During switch initialization, authentication begins automatically on all E_Ports. To enforce this policy fabric-wide, the fabric needs to have Fabric OS 5.3.0 and later switches only. The switch disables the port if it is connected to a switch which does not support authentication. Regardless of the policy, the E_Port is disabled if the DH-CHAP or FCAP protocol fails to authenticate the attached E_Port. ACTIVE In this state the switch is more tolerant and can connect to a switch with any type of policy. During switch initialization, authentication begins on all E_Ports, but the port is not disabled if the connecting switch does not support authentication or the AUTH policy is turned to the OFF state. Fabric OS 6.2 administrator guide 129

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576

Fabric OS 6.2 administrator guide
129
The AUTH policy is designed to accommodate mixed fabric environments that contain Fabric OS 6.0.0
and later along with pre-6.0.0 switches. The policy states PASSIVE and OFF allow connection from
Fabric OS 6.0.0 and later switches to pre-6.0.0 switches. These policy states do not allow switches to send
the authentication negotiation and therefore continue with the rest of port initialization.
Virtual Fabric considerations:
If a Virtual Fabric is enabled, all AUTH module parameters such as shared
secrets, and shared switch and device policies, are Logical Switch-wide. That means you must configure
shared secrets and policies separately on each Logical Switch and the shared secrets and policies must be
set on each switch prior to authentication. On Logical Switch creation, authentication takes default values
for policies and other parameters.
E_Port authentication
The authentication (AUTH) policy allows you to configure DH-CHAP authentication on the switch. By default
the policy is set to PASSIVE and you can change the policy using the
authUtil
command. All changes to
the AUTH policy take effect during the next authentication request. This includes starting authentication on
all E_Ports on the local switch if the policy is changed to ON or ACTIVE, and clearing the authentication if
the policy is changed to OFF. The authentication configurations will be effective only on subsequent E_ and
F_Port initialization.
Virtual Fabric considerations:
The switch authentication policy applies to all E_Ports in a Logical Switch. This
includes ISLs and extended ISLs. Authentication of extended ISLs between two base switches is considered
peer-chassis authentication. Authentication between two physical entities is required, so the extended ISL
that connects the two chassis needs to be authenticated. The corresponding extended ISL for a logical ISL
authenticates the peer-chassis, therefore the logical ISL authentication is not required. Since the logical ISLs
do not carry actual traffic, they do not need to be authenticated. Authentication on re-individualization is
also blocked on logical ISLs. The following error message is printed on the console when you execute the
authUtil –-authinit
command on logical-ISLs,
Failed to initiate authentication.
Authentication is not supported on logical ports <
port#
>
. For more information on
Virtual Fabrics, see Chapter 6, ”
Managing virtual fabrics
” on page 173.
A
secret key pair
has to be installed prior to changing the policy. The policy can be configured as follows:
switch:admin>
authutil –-policy -sw
<ON|ACTIVE|PASSIVE|OFF>
IMPORTANT:
If data input has not been completed and a failover occurs, the command is terminated
without completion and your entire input is lost.
If a failover occurs and data input has been completed and the
Enter
key pressed, data may or may not be
replicated to the other CP depending on the timing of the failover. Log in to the other CP after the failover
is complete and verify that the data was saved. If data was not saved, run the command again.
The following are the available policy modes and properties:
ON
Setting the AUTH policy to ON means that strict authentication is enforced on all
E_Ports. If the connecting switch does not support authentication or the policy is
switched to the OFF state, the ISL is disabled.
During switch initialization, authentication begins automatically on all E_Ports. To
enforce this policy fabric-wide, the fabric needs to have Fabric OS 5.3.0 and later
switches only. The switch disables the port if it is connected to a switch which does not
support authentication. Regardless of the policy, the E_Port is disabled if the
DH-CHAP or FCAP protocol fails to authenticate the attached E_Port.
ACTIVE
In this state the switch is more tolerant and can connect to a switch with any type of
policy. During switch initialization, authentication begins on all E_Ports, but the port is
not disabled if the connecting switch does not support authentication or the AUTH
policy is turned to the OFF state.