HP StorageWorks 8/20q HP StorageWorks 8/20q Fibre Channel Switch command line - Page 77

Device security configuration, Displaying security database information

Page 77 highlights

8 Device security configuration This section describes the following tasks: • Displaying security database information, page 77 • Configuring the security database, page 81 • Modifying the security database, page 82 • Resetting the security database, page 82 • Managing security sets, page 82 • Managing groups, page 83 Device security provides for the authorization and authentication of devices that you attach to a switch. You can configure a switch with a group of devices against which the switch authorizes new attachments by devices, other switches, or devices issuing management server commands. Device security is defined through the use of security sets and groups. A group is a list of device WWNs that are authorized to attach to a switch. There are three types of groups: one for other switches (ISL), another for devices (port), and a third for devices that issue management server commands (MS). A security set is a set of up to three groups with no more than one of each group type. The security database is made up of all security sets on the switch. In addition to providing authorization, the switch can be configured to require authentication to validate the identity of the connecting switch, device, or host. Authentication can be performed locally using the switch's security database, or remotely using a RADIUS server such as Microsoft RADIUS. Displaying security database information You can display the following information about the security database: • Configured security set information, page 77 • Active security set information, page 78 • Security set membership information, page 79 • Group membership information, page 79 • Security database modification history, page 80 • Security database limits, page 80 Configured security set information The securityset list and the security list commands display information about all security sets in the security database. To display a list of the security sets, enter the securityset list command, as shown in the following example: 8/20q FC Switch #> securityset list Current list of SecuritySets alpha beta 8/20q Fibre Channel Switch command line interface guide 77

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

8/20q Fibre Channel Switch command line interface guide
77
8
Device security configuration
This section describes the following tasks:
Displaying security database information
, page 77
Configuring the security database
, page 81
Modifying the security database
, page 82
Resetting the security database
, page 82
Managing security sets
, page 82
Managing groups
, page 83
Device security provides for the authorization and authentication of devices that you attach to a switch. You
can configure a switch with a group of devices against which the switch authorizes new attachments by
devices, other switches, or devices issuing management server commands.
Device security is defined through the use of security sets and groups. A group is a list of device WWNs
that are authorized to attach to a switch. There are three types of groups: one for other switches (ISL),
another for devices (port), and a third for devices that issue management server commands (MS). A
security set is a set of up to three groups with no more than one of each group type. The security database
is made up of all security sets on the switch.
In addition to providing authorization, the switch can be configured to require authentication to validate
the identity of the connecting switch, device, or host. Authentication can be performed locally using the
switch’s security database, or remotely using a RADIUS server such as Microsoft RADIUS.
Displaying security database information
You can display the following information about the security database:
Configured security set information
, page 77
Active security set information
, page 78
Security set membership information
, page 79
Group membership information
, page 79
Security database modification history
, page 80
Security database limits
, page 80
Configured security set information
The
securityset list
and the
security list
commands display information about all security
sets in the security database.
To display a list of the security sets, enter the
securityset list
command, as shown in the following
example:
8/20q FC Switch #> securityset list
Current list of SecuritySets
----------------------------
alpha
beta