HP StorageWorks 8/20q HP StorageWorks 8/20q Fibre Channel Switch command line - Page 91

Device security configuration, Displaying security database information

Page 91 highlights

8 Device security configuration This section describes the following tasks: • Displaying security database information, page 91 • Configuring the security database, page 95 • Modifying the security database, page 96 • Resetting the security database, page 96 • Managing security sets, page 96 • Managing groups, page 97 Device security provides for the authorization and authentication of devices that you attach to a switch. You can configure a switch with a group of devices against which the switch authorizes new attachments by devices, other switches, or devices issuing management server commands. Device security is defined through the use of security sets and groups. A group is a list of device WWNs that are authorized to attach to a switch. There are three types of groups: one for other switches (ISL), another for devices (port), and a third for devices that issue management server commands (MS). A security set is a set of up to three groups with no more than one of each group type. The security database is made up of all security sets on the switch. In addition to providing authorization, the switch can be configured to require authentication to validate the identity of the connecting switch, device, or host. Authentication can be performed locally using the switch's security database, or remotely using a RADIUS server such as Microsoft RADIUS. Displaying security database information You can display the following information about the security database: • Configured security set information, page 91 • Active security set information, page 92 • Security set membership information, page 93 • Group membership information, page 93 • Security database modification history, page 94 • Security database limits, page 94 Configured security set information The securityset list and the security list commands display information about all security sets in the security database. To display a list of the security sets, enter the securityset list command, as shown in the following example: 8/20q FC Switch #> securityset list Current list of SecuritySets alpha beta 8/20q Fibre Channel Switch command line interface guide 91

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332

8/20q Fibre Channel Switch command line interface guide
91
8
Device security configuration
This section describes the following tasks:
Displaying security database information
, page 91
Configuring the security database
, page 95
Modifying the security database
, page 96
Resetting the security database
, page 96
Managing security sets
, page 96
Managing groups
, page 97
Device security provides for the authorization and authentication of devices that you attach to a switch. You
can configure a switch with a group of devices against which the switch authorizes new attachments by
devices, other switches, or devices issuing management server commands.
Device security is defined through the use of security sets and groups. A group is a list of device WWNs
that are authorized to attach to a switch. There are three types of groups: one for other switches (ISL),
another for devices (port), and a third for devices that issue management server commands (MS). A
security set is a set of up to three groups with no more than one of each group type. The security database
is made up of all security sets on the switch.
In addition to providing authorization, the switch can be configured to require authentication to validate
the identity of the connecting switch, device, or host. Authentication can be performed locally using the
switch’s security database, or remotely using a RADIUS server such as Microsoft RADIUS.
Displaying security database information
You can display the following information about the security database:
Configured security set information
, page 91
Active security set information
, page 92
Security set membership information
, page 93
Group membership information
, page 93
Security database modification history
, page 94
Security database limits
, page 94
Configured security set information
The
securityset list
and the
security list
commands display information about all security
sets in the security database.
To display a list of the security sets, enter the
securityset list
command, as shown in the following
example:
8/20q FC Switch #> securityset list
Current list of SecuritySets
----------------------------
alpha
beta