HP StorageWorks 8/40 Brocade Fabric OS Administrator's Guide v6.3.0 (53-100133 - Page 128
TABLE 13, to the RADIUS or LDAP server, nor do they affect any account on the RADIUS or LDAP server.
View all HP StorageWorks 8/40 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 128 highlights
5 The authentication model using RADIUS and LDAP To enable RADIUS or LDAP service, it is strongly recommended that you access the CLI through an SSH connection so that the shared secret is protected. Multiple login sessions can configure simultaneously, and the last session to apply a change leaves its configuration in effect. After a configuration is applied, it persists after a reboot or an HA failover. To enable LDAP service, you need to install a certificate on the Microsoft Active Directory server. The configuration applies to all switches and on a director the configuration replicates itself on a standby CP blade if one is present. It is saved in a configuration upload and applied in a configuration download. You should configure at least two RADIUS servers so that if one fails, the other will assume service. You can set the configuration with both RADIUS or LDAP service and local authentication enabled so that if the RADIUS or LDAP servers do not respond due to power failure or network problems, the switch uses local authentication. Consider the effects of the use of RADIUS or LDAP service on other Fabric OS features. For example, when RADIUS or LDAP service is enabled, all account passwords must be managed on the RADIUS or LDAP server. The Fabric OS mechanisms for changing switch passwords remain functional; however, such changes affect only the involved switches locally. They do not propagate to the RADIUS or LDAP server, nor do they affect any account on the RADIUS or LDAP server. When RADIUS or LDAP is set up for a fabric that contains a mix of switches with and without RADIUS or LDAP support, the way a switch authenticates users depends on whether a RADIUS or LDAP server is set up for that switch. For a switch with RADIUS or LDAP support and configuration, authentication bypasses the local password database. For a switch without RADIUS or LDAP support or configuration, authentication uses the switch's local account names and passwords. Table 13 on page 86 outlines the aaaConfig command options used to set up the authentication mode. TABLE 13 Authentication configuration options aaaConfig options Description Equivalent setting in Fabric OS v5.1.0 and earlier --radius --switchdb1 --authspec "local" --authspec "radius" --authspec "radius;local" Default setting. Authenticates Off management connections against the local database only. If the password does not match or the user is not defined, the login fails. Authenticates management connections On against any RADIUS databases only. If the RADIUS service is not available or the credentials do not match, the login fails. Authenticates management connections against any RADIUS databases first. If RADIUS fails for any reason, authenticates against the local user database. not supported On Off not supported 86 Fabric OS Administrator's Guide 53-1001336-01