Dell Brocade G620 Brocade 8.0.1 Fabric OS Administratiors Guide - Page 410

secret key pair, the DH group defaults to group 4 for all ports con d for in-flight encryption.

Page 410 highlights

In-flight Encryption and Compression You must obtain the WWN of the peer switch to configure the secret key. If you are configuring an EX_Port on an FC router, you can use the fcrEdgeShow command to obtain the WWN of the switch at the other end of the IFL. NOTE Only DH-CHAP authentication is supported for in-flight encryption of EX_Ports. 1. Log in to the switch using an account with admin permissions, or an account with OM permissions for the Authentication RBAC class of commands. ATTENTION When setting a secret key pair , you are entering the shared secrets in plain text. Use a secure channel, such as SSH or the serial console, to connect to the switch on which you are setting the secrets. 2. Configure DH-CHAP or FCAP for authentication using the authUtil --set command with the -a option. switch:admin> authutil --set -a dhchap Authentication is set to dhchap. You can specify any one of the following options: ∙ dhchap ∙ fcap ∙ all The dhchap option sets authentication protocol to DH-CHAP. The fcap option sets authentication protocol to FCAP. Although all enables both FCAP and DH-CHAP, the active protocol defaults to FCAP for all ports configured for in-flight encryption. If dhchap is specified, then all switches in the fabric must enable DH-CHAP and establish pre-shared secrets. If fcap is specified, then all switches in the fabric must enable FCAP and use certificates (CA and switch) installed on them. If the protocol is set to all, you must establish pre-shared secrets or certificates based on the encryption method selected (DH-CHAP or FCAP). 3. Set the DH group to group 4 using the authUtil --set command with the -g option. switch:admin> authutil --set -g "4" DH Group was set to 4. You can specify either "4" or "*" . The "4" option explicitly enables DH group 4. Although "*" enables all DH groups (0 through 4), the DH group defaults to group 4 for all ports configured for in-flight encryption. 4. Configure pre-shared keys or certificates based on the encryption method selected (DH-CHAP or FCAP): ∙ If DH-CHAP is the configured authentication protocol, use the secAuthSecret --set command to establish pre-shared secret key at each end of the ISL. It is recommended to use a 32-bit secret for an ISL carrying encrypted or compressed traffic. switch:admin> secauthsecret --set When prompted, enter the WWN for the remote switch and secret strings for the local switch and the remote switch. ∙ If FCAP is the configured authentication protocol, use the seccertutil command to generate the public or private key, the CSR, and the passphrase and then import certificates (CA and switch) at both the ends of ISL. switch:admin> seccertutil 5. Activate the configured authentication using the authUtil --policy command to set the switch policy mode to Active or On. switch:admin> authutil --policy -sw active Brocade Fabric OS Administration Guide, 8.0.1 410 53-1004111-02

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551

You must obtain the WWN of the peer switch to configure the secret key. If you are configuring an EX_Port on an FC router, you can use
the
fcrEdgeShow
command to obtain the WWN of the switch at the other end of the IFL.
NOTE
Only DH-CHAP authentication is supported for in-flight encryption of EX_Ports.
1.
Log in to the switch using an account with admin permissions, or an account with OM permissions for the Authentication RBAC
class of commands.
ATTENTION
When setting a
secret key pair
, you are entering the shared secrets in plain text. Use a secure channel, such as SSH or
the serial console, to connect to the switch on which you are setting the secrets.
2.
Configure DH-CHAP or FCAP for authentication using the
authUtil --set
command with the
-a
option.
switch:admin> authutil --set -a dhchap
Authentication is set to dhchap.
You can specify any one of the following options:
dhchap
fcap
all
The
dhchap
option sets authentication protocol to DH-CHAP. The
fcap
option sets authentication protocol to FCAP. Although
all
enables both FCAP and DH-CHAP, the active protocol defaults to FCAP for all ports configured for in-flight encryption.
If
dhchap
is specified, then all switches in the fabric must enable DH-CHAP and establish pre-shared secrets. If
fcap
is
specified, then all switches in the fabric must enable FCAP and use certificates (CA and switch) installed on them. If the protocol
is set to
all
, you must establish pre-shared secrets or certificates based on the encryption method selected (DH-CHAP or
FCAP).
3.
Set the DH group to group 4 using the
authUtil --set
command with the
-g
option.
switch:admin> authutil --set -g "4"
DH Group was set to 4.
You can specify either
"4"
or
"*"
. The "4" option explicitly enables DH group 4. Although "*" enables all DH groups (0 through 4),
the DH group defaults to group 4 for all ports configured for in-flight encryption.
4.
Configure pre-shared keys or certificates based on the encryption method selected (DH-CHAP or FCAP):
If DH-CHAP is the configured authentication protocol, use the
secAuthSecret --set
command to establish pre-shared
secret key at each end of the ISL. It is recommended to use a 32-bit secret for an ISL carrying encrypted or compressed
traffic.
switch:admin> secauthsecret --set
When prompted, enter the WWN for the remote switch and secret strings for the local switch and the remote switch.
If FCAP is the configured authentication protocol, use the
seccertutil
command to generate the public or private key, the
CSR, and the passphrase and then import certificates (CA and switch) at both the ends of ISL.
switch:admin> seccertutil
5.
Activate the configured authentication using the
authUtil --policy
command to set the switch policy mode to Active or On.
switch:admin> authutil --policy -sw active
In-flight Encryption and Compression
Brocade Fabric OS Administration Guide, 8.0.1
410
53-1004111-02