HP StorageWorks 8/20q HP StorageWorks 8/20q Fibre Channel Switch command line - Page 87

RADIUS server configuration, Displaying RADIUS server information

Page 87 highlights

9 RADIUS server configuration Authentication can be performed locally using the switch's security database, or remotely using a Remote Dial-In User Service (RADIUS) server such as Microsoft RADIUS. With a RADIUS server, the security database for the entire fabric resides on the server. In this way, the security database can be managed centrally, rather than on each switch. However, when using a RADIUS server, every switch in the fabric must have a network connection. You can configure up to five RADIUS servers to provide failover. You can configure a RADIUS server to authenticate only the switch or both the switch and the initiator device, if the device supports authentication. A RADIUS server can also be configured to authenticate user accounts. See "User account configuration" on page 21. A secure connection is required to authenticate user logins with a RADIUS server. See "Connection security configuration" on page 73. This section describes the following tasks: • Displaying RADIUS server information, page 87 • Configuring a RADIUS server on the switch, page 88 Displaying RADIUS server information To display RADIUS server information, enter the show setup radius command, as shown in the following example. For information about RADIUS server configuration parameters, see Table 40. 8/20q FC Switch #> show setup radius Radius Information DeviceAuthOrder RadiusLocal UserAuthOrder RadiusLocal TotalServers 1 Server: 1 ServerIPAddress ServerUDPPort DeviceAuthServer UserAuthServer AccountingServer Timeout Retries SignPackets Secret 10.20.11.8 1812 False True False 2 0 False ******** 8/20q Fibre Channel Switch command line interface guide 87

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

8/20q Fibre Channel Switch command line interface guide
87
9
RADIUS server configuration
Authentication can be performed locally using the switch’s security database, or remotely using a Remote
Dial-In User Service (RADIUS) server such as Microsoft RADIUS. With a RADIUS server, the security
database for the entire fabric resides on the server. In this way, the security database can be managed
centrally, rather than on each switch. However, when using a RADIUS server, every switch in the fabric
must have a network connection. You can configure up to five RADIUS servers to provide failover.
You can configure a RADIUS server to authenticate only the switch or both the switch and the initiator
device, if the device supports authentication. A RADIUS server can also be configured to authenticate user
accounts. See ”
User account configuration
” on page 21. A secure connection is required to authenticate
user logins with a RADIUS server. See ”
Connection security configuration
” on page 73.
This section describes the following tasks:
Displaying RADIUS server information
, page 87
Configuring a RADIUS server on the switch
, page 88
Displaying RADIUS server information
To display RADIUS server information, enter the
show setup radius
command, as shown in the
following example. For information about RADIUS server configuration parameters, see
Table 40
.
8/20q FC Switch #> show setup radius
Radius Information
------------------
DeviceAuthOrder
RadiusLocal
UserAuthOrder
RadiusLocal
TotalServers
1
Server: 1
ServerIPAddress
10.20.11.8
ServerUDPPort
1812
DeviceAuthServer
False
UserAuthServer
True
AccountingServer
False
Timeout
2
Retries
0
SignPackets
False
Secret
********