Dell PowerEdge M1000e Web Tools Administrator’s Guide - Page 247

Authentication policy configuration, Configuring authentication policies for E_Ports

Page 247 highlights

DRAFT: BROCADE CONFIDENTIAL Authentication policy configuration 17 3. Under Security Policies, click FWCP. 4. Select one of the following consistency behavior for the required policy type (SCC, DCC, FCS). • Absent • Tolerant • Strict NOTE You can change the consistency behaviors of SCC, DCC, or FCS policy only for a primary switch. 5. Click Apply. 6. Click Yes to accept the changes. NOTE If the switch is not a primary switch, an error message dialog box displays. 7. Click No to discard the changes and click Refresh in the FWCP Configuration window to manually refresh the window. 8. Click Close. Authentication policy configuration You can configure an authentication protocol policy for E_Port and F_Port authentication, and then distribute the authentication policy to other switches in the fabric. You can also set shared secret keys. Configuring authentication policies for E_Ports Use the following procedure to configure authentication policies for E_Ports. 1. Open the Switch Administration window as described in "Opening the Switch Administration window" on page 35. 2. Select the Security Policies tab. 3. Select Authentication on the Security Policies menu. 4. In the Authentication Type field, select FCAP or DHCHAP. 5. Select the switch authentication policy mode: : On Active Strict authentication is enforced on all E_Ports. The switches can be connected to a switch with any type of policy. Web Tools Administrator's Guide 219 53-1001772-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310

Web Tools Administrator’s Guide
219
53-1001772-01
Authentication policy configuration
17
DRAFT: BROCADE CONFIDENTIAL
3.
Under
Security Policies
, click
FWCP
.
4.
Select one of the following consistency behavior for the required policy type (
SCC, DCC, FCS
).
Absent
Tolerant
Strict
NOTE
You can change the consistency behaviors of SCC, DCC, or FCS policy only for a primary switch.
5.
Click
Apply
.
6.
Click
Yes
to accept the changes.
NOTE
If the switch is not a primary switch, an error message dialog box displays.
7.
Click
No
to discard the changes and click
Refresh
in the
FWCP Configuration
window to
manually refresh the window.
8.
Click
Close.
Authentication policy configuration
You can configure an authentication protocol policy for E_Port and F_Port authentication, and then
distribute the authentication policy to other switches in the fabric. You can also set shared secret
keys.
Configuring authentication policies for E_Ports
Use the following procedure to configure authentication policies for E_Ports.
1.
Open the
Switch Administration
window as described in
“Opening the Switch Administration
window”
on page 35.
2.
Select the
Security Policies
tab.
3.
Select
Authentication
on the
Security Policies
menu.
4.
In the
Authentication Type
field, select
FCAP
or
DHCHAP
.
5.
Select the switch authentication policy mode:
:
On
Strict authentication is enforced on all E_Ports.
Active
The switches can be connected to a switch with any
type of policy.