S e n d d o c u m e n t a t i o n c o m m e n t s t o m d s f e e d b a c k - d o c @ c i s c o . c o m
36-9
Cisco MDS 9000 Family CLI Configuration Guide
OL-16184-01, Cisco MDS SAN-OS Release 3.x
Chapter 36 Configuring FC-SP and DHCHAP
DHCHAP
To configure the AAA authentication , follow these steps:
Displaying Protocol Security Information
Use the
show fcsp
commands to display configurations for the local database (see
Example 36-1
through
36-6
).
Example 36-1 Displays DHCHAP Configurations in FC Interfaces
switch#
show fcsp interface fc1/9
fc1/9:
fcsp authentication mode:SEC_MODE_ON
Status: Successfully authenticated
Example 36-2 Displays DHCHAP Statistics for an FC Interface
switch#
show fcsp interface fc1/9 statistics
fc1/9:
fcsp authentication mode:SEC_MODE_ON
Status: Successfully authenticated
Statistics:
FC-SP Authentication Succeeded:5
FC-SP Authentication Failed:0
FC-SP Authentication Bypassed:0
Example 36-3 Displays the FC-SP WWN of the Device Connected through a Specified Interface
switch#
show fcsp interface fc 2/1 wwn
fc2/1:
fcsp authentication mode:SEC_MODE_ON
Status: Successfully authenticated
Other device's WWN:20:00:00:e0:8b:0a:5d:e7
Example 36-4 Displays Hash Algorithm and DHCHAP Groups Configured for the Local Switch
switch#
show fcsp dhchap
Supported Hash algorithms (in order of preference):
DHCHAP_HASH_MD5
DHCHAP_HASH_SHA_1
Supported Diffie Hellman group ids (in order of preference):
Command
Purpose
Step 1
switch#
config t
Enters configuration mode.
Step 2
switch(config)#
aaa authentication dhchap
default group TacacsServer1
Enables DHCHAP to use the server group
(in this example, TacacsServer1) for authentication.
switch(config)#
aaa authentication dhchap
default local
Enables DHCHAP for local authentication.
switch(config)#
aaa authentication dhchap
default group RadiusServer1
Enables DHCHAP to use the RADIUS server group
(in this example, RadiusServer1) for authentication.