Dell PowerEdge M600 Web Tools Administrator’s Guide - Page 269

Editing an IKE or IPsec policy, Establishing authentication policies for HBAs

Page 269 highlights

DRAFT: BROCADE CONFIDENTIAL Establishing authentication policies for HBAs 17 Editing an IKE or IPsec policy An existing IKE or IPsec policy can be edited. Use the following procedure to edit an IKE or IPsec policy. 1. Open the Switch Administration window. 2. Click Show Advanced Mode. 3. Select the Security Policies tab. 4. Under Security Policies, select Ethernet IPsec or Ethernet IPsec. 5. Select the policy you want to edit. 6. Select Edit. An Edit Policy dialog box displays. 7. Edit the policy as needed. 8. Click OK. Deleting an IKE or IPsec policy You can delete one or more IKE or IPsec policies. Use the following procedure to delete an IKE or IPsec policy. 1. Open the Switch Administration window. 2. Select Show Advanced Mode. 3. Select the Security Policies tab. 4. Under Security Policies, select Ethernet IPsec or Ethernet IPsec. 5. Select the policy or policies you want to delete. 6. Select Delete. The policy is deleted from the SA database (SADB), and is removed from the list. Establishing authentication policies for HBAs Perform the following procedure to establish and enable authentication policies for HBAs as the log in to a fabric. 1. Open the Switch Administration window. 2. Click Show Advanced Mode. 3. Select the Security Policies tab. 4. Select Authentication under Security Policies. The Authentication Policy Settings screen displays. 5. Under Configure Authentication Policy, do the following. Web Tools Administrator's Guide 241 53-1001772-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310

Web Tools Administrator’s Guide
241
53-1001772-01
Establishing authentication policies for HBAs
17
DRAFT: BROCADE CONFIDENTIAL
Editing an IKE or IPsec policy
An existing IKE or IPsec policy can be edited.
Use the following procedure to edit an IKE or IPsec policy.
1.
Open the
Switch Administration
window.
2.
Click
Show Advanced Mode
.
3.
Select the
Security Policies
tab.
4.
Under
Security Policies
, select
Ethernet IPsec
or
Ethernet IPsec
.
5.
Select the policy you want to edit.
6.
Select
Edit
.
An
Edit Policy
dialog box displays.
7.
Edit the policy as needed.
8.
Click
OK
.
Deleting an IKE or IPsec policy
You can delete one or more IKE or IPsec policies.
Use the following procedure to delete an IKE or IPsec policy.
1.
Open the
Switch Administration
window.
2.
Select
Show Advanced Mode
.
3.
Select the
Security Policies
tab.
4.
Under
Security Policies
, select
Ethernet IPsec
or
Ethernet IPsec
.
5.
Select the policy or policies you want to delete.
6.
Select
Delete
.
The policy is deleted from the SA database (SADB), and is removed from the list.
Establishing authentication policies for HBAs
Perform the following procedure to establish and enable authentication policies for HBAs as the log
in to a fabric.
1.
Open the
Switch Administration
window.
2.
Click
Show Advanced Mode
.
3.
Select the
Security Policies
tab.
4.
Select
Authentication
under Security Policies.
The
Authentication Policy Settings
screen displays.
5.
Under
Configure Authentication Policy
, do the following.