HP StorageWorks MSA 2/8 HP StorageWorks Fabric OS 3.X Document Addendum (AA-RW - Page 137

Considerations for RADIUS Use, Advanced Web Tools. The following items apply

Page 137 highlights

Fabric OS procedures user guide To enable RADIUS service, access the CLI through an SSH connection so that the shared secret is protected. Multiple login sessions can configure simultaneously, and the last session to apply a change leaves its configuration in effect. After a configuration is applied, it persists after a reboot or an HA failover. The configuration is chassis-based, so it applies to all logical switches (domains) on the switch and replicates itself on a standby CP card, if one is present. It is saved in a firmware upload, so it can be applied to other switches in a firmware download. Configure at least two RADIUS servers so that if one fails, the other assumes service. You can set the configuration with both RADIUS service and local authentication enabled so that if all RADIUS servers do not respond (because of power failure or network problems), the switch uses local authentication. Considerations for RADIUS Use Consider the following effects of the use of RADIUS service on other Fabric OS features: ■ Passwords - When RADIUS service is enabled, all account passwords must be managed on the RADIUS server. The Fabric OS mechanisms for changing switch passwords remain functional; however, such changes affect only the involved switches locally. They do not propagate to the RADIUS server, nor do they affect any account on the RADIUS server. - When RADIUS is set up for a fabric that contains a mix of switches running v4.4.0, v3.2.x, or earlier, the way a switch authenticates users depends on whether a RADIUS server is set up for that switch. For a switch with RADIUS support and configuration, authentication bypasses the local password database. For a switch without RADIUS support or configuration, authentication uses switch local account names and passwords. ■ Secure Fabric OS. In secure mode, the following items apply: - Account passwords are distributed among all switches in the same fabric. An account that resides on several switches has the same password on all of them. This model applies with RADIUS integration; such a distribution affects only the switch local password database. - There are separate admin and nonfcsadmin roles in secure mode. A nonfcsadmin account on a RADIUS server cannot access FCS switches, even if the account is properly authenticated. - If a nonfcsadmin account on a RADIUS server logs in to a switch in nonsecure mode, the switch treats the role like the admin role and grants the access. - The secure Fabric OS telnet policy does not affect the operation of the RADIUS protocol. ■ Advanced Web Tools. The following items apply: - Advanced Web Tools client and server keep an open session after a user is authenticated. A password change on a switch invalidates an open session and requires the user to log in again. When integrated with RADIUS, a switch password change on the RADIUS server does not invalidate an existing open session. However, a password change on the local switch does invalidate an existing open session. - If you cannot log in because of a RADIUS server connection problem, Advanced Web Tools displays a message indicating server outage. Fabric OS 3.x Document Addendum 137

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

Fabric OS procedures user guide
137
Fabric OS 3.x Document Addendum
To enable RADIUS service, access the CLI through an SSH connection so that the shared
secret is protected. Multiple login sessions can configure simultaneously, and the last session
to apply a change leaves its configuration in effect. After a configuration is applied, it persists
after a reboot or an HA failover.
The configuration is chassis-based, so it applies to all logical switches (domains) on the switch
and replicates itself on a standby CP card, if one is present. It is saved in a firmware upload, so
it can be applied to other switches in a firmware download. Configure at least two RADIUS
servers so that if one fails, the other assumes service. You can set the configuration with both
RADIUS service and local authentication enabled so that if all RADIUS servers do not
respond (because of power failure or network problems), the switch uses local authentication.
Considerations for RADIUS Use
Consider the following effects of the use of RADIUS service on other Fabric OS features:
Passwords
When RADIUS service is enabled, all account passwords must be managed on the
RADIUS server. The Fabric OS mechanisms for changing switch passwords remain
functional; however, such changes affect only the involved switches locally. They do
not propagate to the RADIUS server, nor do they affect any account on the RADIUS
server.
When RADIUS is set up for a fabric that contains a mix of switches running v4.4.0,
v3.2.x, or earlier, the way a switch authenticates users depends on whether a RADIUS
server is set up for that switch. For a switch with RADIUS support and configuration,
authentication bypasses the local password database. For a switch without RADIUS
support or configuration, authentication uses switch local account names and
passwords.
Secure Fabric OS. In secure mode, the following items apply:
Account passwords are distributed among all switches in the same fabric. An account
that resides on several switches has the same password on all of them. This model
applies with RADIUS integration; such a distribution affects only the switch local
password database.
There are separate admin and nonfcsadmin roles in secure mode. A nonfcsadmin
account on a RADIUS server cannot access FCS switches, even if the account is
properly authenticated.
If a nonfcsadmin account on a RADIUS server logs in to a switch in nonsecure mode,
the switch treats the role like the admin role and grants the access.
The secure Fabric OS telnet policy does not affect the operation of the RADIUS
protocol.
Advanced Web Tools. The following items apply:
Advanced Web Tools client and server keep an open session after a user is
authenticated. A password change on a switch invalidates an open session and requires
the user to log in again. When integrated with RADIUS, a switch password change on
the RADIUS server does not invalidate an existing open session. However, a password
change on the local switch does invalidate an existing open session.
If you cannot log in because of a RADIUS server connection problem, Advanced Web
Tools displays a message indicating server outage.