Dell Brocade G620 Brocade 8.0.1 Fabric OS Administratiors Guide - Page 405

Authentication and key generation for encryption and compression, Hash Type - SHA256, SHA1, md5

Page 405 highlights

In-flight Encryption and Compression ATTENTION Any mismatch in configuration at either end of the IFL or authentication failure results in segmentation or, in rare cases, the port being disabled. The most common reasons for E_Port or EX_Port segmentation include the following situations: ∙ Port authentication fails. One of the following error messages is displayed: Authentication Rejected Authentication Failure ∙ Encryption or compression configurations do not match at both ends. For example, if at one end there is a switch that does not support encryption or compression, the port will be disabled. One of the following error messages is displayed: Compression configuration mismatch Encryption configuration mismatch ∙ An encryption or compression configuration is enabled but resources are not available, or there are other failures preventing encryption or compression from being enabled. The following error message is displayed. Encryption/Compression enabled but resource unavailable ∙ The number of available ports has reached the bandwidth limitation. NOTE If trunking is enabled, be aware that the ports creating the bandwidth limitation will form a trunk group, while the rest of the ports will be segmented. You can also decommission any port that has in-flight encryption and compression enabled. Refer to Port decommissioning on page 83 for details on decommissioning ports. Authentication and key generation for encryption and compression The following points apply to authentication and key generation on the supported devices: ∙ Authentication and key generation only apply to ports that are configured for encryption. They do not apply to ports that are only configured for compression. ∙ Authentication using FCAP or DH-CHAP is supported between E_Ports and F_Ports connecting Brocade switches and Access Gateway devices. However, EX_Ports only support authentication using DH-CHAP. This means that if an inter-fabric link (IFL) must be authenticated, the authentication type on edge fabric should be set to either DH-CHAP or ALL. Configuration done in FCR using the authUtil command is applicable only for backbone fabric (E_Ports in FCR, not EX_Ports). Authentication parameters for FCR cannot be modified. - Default configuration: › Authentication Type - DH-CHAP › Hash Type - SHA256, SHA1, md5 › Group Type - 0,1,2,3,4 › Switch Authentication Policy - Passive - FIPS mode configuration: › Authentication Type - DH-CHAP › Hash Type - SHA256, SHA1 › Group Type - 4 › Switch Authentication Policy - Passive Brocade Fabric OS Administration Guide, 8.0.1 53-1004111-02 405

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551

ATTENTION
Any mismatch in configuration at either end of the IFL or authentication failure results in segmentation or, in rare cases, the port
being disabled.
The most common reasons for E_Port or EX_Port segmentation include the following situations:
Port authentication fails. One of the following error messages is displayed:
Authentication Rejected
Authentication Failure
Encryption or compression configurations do not match at both ends. For example, if at one end there is a switch that does not
support encryption or compression, the port will be disabled. One of the following error messages is displayed:
Compression configuration mismatch
Encryption configuration mismatch
An encryption or compression configuration is enabled but resources are not available, or there are other failures preventing
encryption or compression from being enabled. The following error message is displayed.
Encryption/Compression enabled but resource unavailable
The number of available ports has reached the bandwidth limitation.
NOTE
If trunking is enabled, be aware that the ports creating the bandwidth limitation will form a trunk group, while the rest of the ports
will be segmented.
You can also decommission any port that has in-flight encryption and compression enabled. Refer to
Port decommissioning
on page 83
for details on decommissioning ports.
Authentication and key generation for encryption and compression
The following points apply to authentication and key generation on the supported devices:
Authentication and key generation only apply to ports that are configured for encryption. They do not apply to ports that are
only configured for compression.
Authentication using FCAP or DH-CHAP is supported between E_Ports and F_Ports connecting Brocade switches and Access
Gateway devices. However, EX_Ports only support authentication using DH-CHAP. This means that if an inter-fabric link (IFL)
must be authenticated, the authentication type on edge fabric should be set to either DH-CHAP or ALL. Configuration done in
FCR using the
authUtil
command is applicable only for backbone fabric (E_Ports in FCR, not EX_Ports). Authentication
parameters for FCR cannot be modified.
Default configuration:
Authentication Type - DH-CHAP
Hash Type - SHA256, SHA1, md5
Group Type - 0,1,2,3,4
Switch Authentication Policy - Passive
FIPS mode configuration:
Authentication Type - DH-CHAP
Hash Type - SHA256, SHA1
Group Type - 4
Switch Authentication Policy - Passive
In-flight Encryption and Compression
Brocade Fabric OS Administration Guide, 8.0.1
53-1004111-02
405