Dell Brocade 6520 Web Tools Administrator's Guide Supporting Fabric OS v7.1.0 - Page 228

Establishing authentication policies for HBAs

Page 228 highlights

15 Establishing authentication policies for HBAs Establishing authentication policies for HBAs To establish and enable authentication policies for HBAs as the log in to a fabric, perform the following steps. 1. Open the Switch Administration window. 2. Click Show Advanced Mode. 3. Select the Security Policies tab. 4. Select Authentication under Security Policies. The Authentication Policy Settings screen displays. 5. Under Configure Authentication Policy, do the following. • Select the Authentication Type. The choices are FCAP, DHCHAP, or both. • Select the Switch Authentication Policy Mode. The choices are Passive, Active, On, or Off. • Select the Hash Type used. The choices are SHA1, MD5, or both. • Select the DH-Group Type. The choices are 0, 1, 2, 3, 4; 0 (DH Null option), 1 (1024 bit key), 2 (1280 bit key), 3 (1536 bit key), or 4 (2048 bit key). • Use the Device Authentication Policy Mode selector to set the desired mode. The choices are On, Off, or Passive. • Click Apply. 6. If your authentication method uses a shared secret, select the Shared Secret Keys tab. The Shared Secret Keys screen displays. 7. Select Add. The Add Shared Secret Keys dialog box displays. 8. Enter or browse to select the switch/HBA WWN or name or domain ID in the Switch or HBA WWN/Name/Domain ID field. 9. Enter the shared secret key for the peer device (an HBA in this case) in the Peer Shared Secret and Confirm Peer Shared Secret fields. 10. Enter the shared secret for switch in the Local Shared Secret and Confirm Local Shared Secret fields. 11. Click Add. An entry is added in the Switch WWN box. 12. Click OK. 13. Add more shared secrets, if needed. 200 Web Tools Administrator's Guide 53-1002756-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268

200
Web Tools Administrator’s Guide
53-1002756-01
Establishing authentication policies for HBAs
15
Establishing authentication policies for HBAs
To establish and enable authentication policies for HBAs as the log in to a fabric, perform the
following steps.
1.
Open the
Switch Administration
window.
2.
Click
Show Advanced Mode
.
3.
Select the
Security Policies
tab.
4.
Select
Authentication
under Security Policies.
The
Authentication Policy Settings
screen displays.
5.
Under
Configure Authentication Policy
, do the following.
Select the
Authentication Type
. The choices are FCAP, DHCHAP, or both.
Select the
Switch Authentication Policy Mode
. The choices are Passive, Active, On, or Off.
Select the
Hash Type
used. The choices are SHA1, MD5, or both.
Select the
DH-Group Type
. The choices are 0, 1, 2, 3, 4; 0 (DH Null option), 1 (1024 bit
key), 2 (1280 bit key), 3 (1536 bit key), or 4 (2048 bit key).
Use the
Device Authentication Policy Mode
selector to set the desired mode. The choices
are On, Off, or Passive.
Click
Apply
.
6.
If your authentication method uses a shared secret, select the
Shared Secret Keys
tab.
The
Shared Secret Keys
screen displays.
7.
Select
Add
.
The
Add Shared Secret Keys
dialog box displays.
8.
Enter or browse to select the switch/HBA WWN or name or domain ID in the
Switch or HBA
WWN/Name/Domain ID
field.
9.
Enter the shared secret key for the peer device (an HBA in this case) in the
Peer Shared Secret
and
Confirm Peer Shared Secret
fields.
10.
Enter the shared secret for switch in the
Local Shared Secret
and
Confirm Local Shared Secret
fields.
11. Click
Add
.
An entry is added in the
Switch WWN
box.
12. Click
OK
.
13.
Add more shared secrets, if needed.