HP StorageWorks 8/20q HP StorageWorks 8/20q Fibre Channel Switch Installation - Page 27

Device security

Page 27 highlights

The SSL handshake process between the workstation and the switch involves the exchanging of certificates. These certificates contain the public and private keys that define the encryption. When the SSL service is enabled, a certificate is automatically created on the switch. The workstation validates the switch certificate by comparing the workstation date and time to the switch certificate creation date and time. For this reason, it is important to synchronize the workstation and switch with the same date, time, and time zone. The switch certificate is valid 24 hours before its creation date and 365 days after its creation date. If the certificate should become invalid, create a new certificate using the create certificate CLI command. For information about the create certificate CLI command, see the HP StorageWorks 8/20q Fibre Channel Switch Command Line Interface Guide. NOTE: Simple SAN Connection Manager version 1.0 does not support the SSL service. If SSL is enabled, you will be unable to manage the switch using this version of Simple SAN Connection Manager. Consider your requirements for connection security: for the command line interface (SSH), management applications (SSL), or both. If an SSL connection security is required, also consider using the Network Time Protocol (NTP) to synchronize workstations and switches. Device security Device security provides for the authorization and authentication of devices that you attach to a switch. You can configure a switch with a group of devices against which the switch authorizes new attachments by devices, other switches, or devices issuing management server commands. Device security is configured through the use of security sets and groups. Use the CLI to configure device security. For more information about device security configuration, see the HP StorageWorks 8/20q Fibre Channel Switch Command Line Interface Guide. A group is a list of device worldwide names that are authorized to attach to a switch. There are three types of groups: one for other switches (ISL), another for devices (port), and a third for devices issuing management server commands (MS). A security set is a set of up to three groups with no more than one of each group type. The security configuration is made up of all security sets on the switch. The security database has the following limits: • Maximum number of security sets is 4. • Maximum number of groups is 16. • Maximum number of members in a group is 1,000. • Maximum total number of group members is 1,000. In addition to authorization, the switch can be configured to require authentication to validate the identity of the connecting switch, device, or host. Authentication can be performed locally using the switch's security database, or remotely using a RADIUS server such as Microsoft RADIUS. With a RADIUS server, the security database for the entire fabric resides on the server. In this way, the security database can be managed centrally, rather than on each switch. You can configure up to five RADIUS servers to provide failover. You can configure the RADIUS server to authenticate just the switch or both the switch and the initiator device if the device supports authentication. When using a RADIUS server, every switch in the fabric must have a network connection. A RADIUS server can also be configured to authenticate user accounts as described in "User account security" on page 26. A secure connection is required to authenticate user logins with a RADIUS server. For more information, see "Connection security" on page 26. Consider the devices, switches, and management agents and evaluate the need for authorization and authentication. Also consider whether the security database is to be distributed on the switches or centralized on a RADIUS server and how many servers to configure. Use the CLI to configure RADIUS servers. For more information about RADIUS server configuration, see the HP StorageWorks 8/20q Fibre Channel Switch Command Line Interface Guide. 8/20q Fibre Channel Switch Installation and Reference Guide 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

8/20q Fibre Channel Switch Installation and Reference Guide
27
The SSL handshake process between the workstation and the switch involves the exchanging of certificates.
These certificates contain the public and private keys that define the encryption. When the SSL service is
enabled, a certificate is automatically created on the switch. The workstation validates the switch certificate
by comparing the workstation date and time to the switch certificate creation date and time. For this
reason, it is important to synchronize the workstation and switch with the same date, time, and time zone.
The switch certificate is valid 24 hours before its creation date and 365 days after its creation date. If the
certificate should become invalid, create a new certificate using the
create certificate
CLI
command. For information about the
create certificate
CLI command, see the
HP StorageWorks
8/20q Fibre Channel Switch Command Line Interface Guide
.
NOTE:
Simple SAN Connection Manager version 1.0 does not support the SSL service. If SSL is enabled,
you will be unable to manage the switch using this version of Simple SAN Connection Manager.
Consider your requirements for connection security: for the command line interface (SSH), management
applications (SSL), or both. If an SSL connection security is required, also consider using the Network Time
Protocol (NTP) to synchronize workstations and switches.
Device security
Device security provides for the authorization and authentication of devices that you attach to a switch. You
can configure a switch with a group of devices against which the switch authorizes new attachments by
devices, other switches, or devices issuing management server commands. Device security is configured
through the use of security sets and groups. Use the CLI to configure device security. For more information
about device security configuration, see the
HP StorageWorks 8/20q Fibre Channel Switch Command Line
Interface Guide
.
A group is a list of device worldwide names that are authorized to attach to a switch. There are three types
of groups: one for other switches (ISL), another for devices (port), and a third for devices issuing
management server commands (MS).
A security set is a set of up to three groups with no more than one of each group type. The security
configuration is made up of all security sets on the switch. The security database has the following limits:
Maximum number of security sets is 4.
Maximum number of groups is 16.
Maximum number of members in a group is 1,000.
Maximum total number of group members is 1,000.
In addition to authorization, the switch can be configured to require authentication to validate the identity
of the connecting switch, device, or host. Authentication can be performed locally using the switch’s
security database, or remotely using a RADIUS server such as Microsoft RADIUS. With a RADIUS server,
the security database for the entire fabric resides on the server. In this way, the security database can be
managed centrally, rather than on each switch. You can configure up to five RADIUS servers to provide
failover.
You can configure the RADIUS server to authenticate just the switch or both the switch and the initiator
device if the device supports authentication. When using a RADIUS server, every switch in the fabric must
have a network connection. A RADIUS server can also be configured to authenticate user accounts as
described in ”
User account security
” on page 26. A secure connection is required to authenticate user
logins with a RADIUS server. For more information, see ”
Connection security
” on page 26.
Consider the devices, switches, and management agents and evaluate the need for authorization and
authentication. Also consider whether the security database is to be distributed on the switches or
centralized on a RADIUS server and how many servers to configure. Use the CLI to configure RADIUS
servers. For more information about RADIUS server configuration, see the
HP StorageWorks 8/20q Fibre
Channel Switch Command Line Interface Guide
.