HP StorageWorks 8/20q HP StorageWorks 8/20q Fibre Channel Switch event message - Page 31

A Remote Authentication Dial, In User Service RADIUS

Page 31 highlights

Table 4 Alarm events and recommended action (Continued) Icon Event ID and message Description Action (A1007.0012) (Port with World Wide Name (WWN) port_WWN address FC_address not authorized to login, verify MS security configuration) (A1007.0013) (Response from address FC_address, lacks authentication, discarding) (A1007.0014) (Response from WorldWide Name (WWN) device_WWN address FC_address, failed authentication, discarding) The port cannot login with the Add the named port to the current security configuration. Management Server group in the active security set. A response received on the indicated port lacked Common Transport (CT) authentication. A request received on the indicated port failed Common Transport (CT) authentication. Verify that the CT security configuration of the management application using the remote port is compatible with the configuration of the Management Server security group on the switch. Verify that the CT security configuration of the management application using the remote port is compatible with the configuration of the Management Server security group on the switch. (A1007.001C) (Security: Bad Authentication Flags) The received AUTH frame did not meet the standard format for the frame payload. Within the header portion of the payload, there are some flags that are supposed to be set to zero (0). This frame has the flags set to something other than zero (0). Check the remote device for a possible error condition. Reset the port to retry again. If errors continue, disable Challenge Handshake Authentication Protocol (CHAP) for this device if it belongs in the fabric. (A1007.001D) (Ignoring RADIUS Server Radius_Server, invalid IP address configured) A Remote Authentication Dial In User Service (RADIUS) server could not be found at the configured IP address. Check the RADIUS server, or change the configuration to use an IP address for a valid RADIUS server. (A1007.001F) (Access reject from RADIUS server IP_address:port for device on this port) (A1007.0020) (MAX Retry count reached on CHAP Authentication Protocol Reset, failing Authentication) (A1007.0021) (No response to RADIUS access request for device on port port) Security authentication has reached the maximum retry count. The port will now isolate. A Remote Authentication Dial In User Service (RADIUS) server has rejected a RADIUS authentication request. A configured Remote Authentication Dial In User Service (RADIUS) server did not respond to an authentication request within the timeout period. Check the security configuration. Check the configuration on both the switch and on the RADIUS server for incompatibilities. Check RADIUS server configuration and the RADIUS server. 8/20q Fibre Channel Switch event messages reference guide 31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52

8/20q Fibre Channel Switch event messages reference guide
31
(A1007.0012) (Port with
World Wide Name (WWN)
port_WWN
address
FC_address
not
authorized to login,
verify MS security
configuration)
The port cannot login with the
current security configuration.
Add the named port to the
Management Server group in
the active security set.
(A1007.0013) (Response
from address
FC_address
, lacks
authentication,
discarding)
A response received on the
indicated port lacked
Common Transport (CT)
authentication.
Verify that the CT security
configuration of the
management application
using the remote port is
compatible with the
configuration of the
Management Server security
group on the switch.
(A1007.0014) (Response
from WorldWide Name
(WWN)
device_WWN
address
FC_address
,
failed authentication,
discarding)
A request received on the
indicated port failed
Common Transport (CT)
authentication.
Verify that the CT security
configuration of the
management application
using the remote port is
compatible with the
configuration of the
Management Server security
group on the switch.
(A1007.001C) (Security:
Bad Authentication
Flags)
The received AUTH frame did
not meet the standard format
for the frame payload. Within
the header portion of the
payload, there are some flags
that are supposed to be set to
zero (0). This frame has the
flags set to something other
than zero (0).
Check the remote device for a
possible error condition.
Reset the port to retry again.
If errors continue, disable
Challenge Handshake
Authentication Protocol
(CHAP) for this device if it
belongs in the fabric.
(A1007.001D) (Ignoring
RADIUS Server
Radius_Server
, invalid
IP address configured)
A Remote Authentication Dial
In User Service (RADIUS)
server could not be found at
the configured IP address.
Check the RADIUS server, or
change the configuration to
use an IP address for a valid
RADIUS server.
(A1007.001F) (Access
reject from RADIUS
server
IP_address:port
for device on this
port)
Security authentication has
reached the maximum retry
count. The port will now
isolate.
Check the security
configuration.
(A1007.0020) (MAX Retry
count reached on CHAP
Authentication Protocol
Reset, failing
Authentication)
A Remote Authentication Dial
In User Service (RADIUS)
server has rejected a RADIUS
authentication request.
Check the configuration on
both the switch and on the
RADIUS server for
incompatibilities.
(A1007.0021) (No
response to RADIUS
access request for
device on port
port
)
A configured Remote
Authentication Dial In User
Service (RADIUS) server did
not respond to an
authentication request within
the timeout period.
Check RADIUS server
configuration and the
RADIUS server.
Table 4
Alarm events and recommended action (Continued)
Icon
Event ID and message
Description
Action