210 Using the FC-FC routing service
it is connected. For example, on the 4/256 SAN Director with a B-Series MP Router blade, specify the
WWN of the Secure Fabric OS switch and the secrets. On the Secure Fabric OS switch, specify the WWN
of the front domain (EX_Port or VEX_Port) and the secrets. To view the front domain WWN, issue the
portCfgEXPort
command on the Fibre Channel router side.
The WWN of the front domain (EX_Port or VEX_Port) that is connected to the Secure Fabric OS switch
should be present in the Switch Connection Controls (SCC) list. See the
Secure Fabric OS Administrator’s
Guide
for details about the SCC and other Secure Fabric OS features.
To configure a DH-CHAP secret word
1.
Log in to the 400 MP Router or 4/256 SAN Director with a B-Series MP Router blade with
administrative privileges.
2.
At the telnet prompt, enter the
secAuthSecret
command. The secret must be between 8 and 40
characters long.
Setting up secret keys does not initiate DH-CHAP authentication. DH-CHAP authentication is performed
whenever a port or a switch is enabled.
3.
Follow the instructions provided on screen, as shown in the following example.
a.
Type the port or switch WWN.
NOTE:
Use only the WWN as the input. The domain ID or switch name is not acceptable.
b.
Type and confirm the peer secret.
c.
Type and confirm the local secret.
4.
After you have added all of the DH-CHAP secret information, press
Enter
to indicate that you have
completed the secret key setup.
5.
When prompted, type
y
. The DH-CHAP secret is now stored in the secret word database and is ready
for use.
switch:admin_06>
secauthsecret --set
This command is used to set up secret keys for the DH-CHAP authentication.
The minimum length of a secret key is 8 characters and maximum 40
characters. Setting up secret keys does not initiate DH-CHAP
authentication. If switch is configured to do DH-CHAP, it is performed
whenever a port or a switch is enabled.
Warning: Please use a secure channel for setting secrets. Using
an insecure channel is not safe and may compromise secrets.
Following inputs should be specified for each entry.
1. WWN for which secret is being set up.
2. Peer secret: The secret of the peer that authenticates to peer.
3. Local secret: The local secret that authenticates peer.
Press enter to start setting up secrets >
Enter WWN, Domain, or switch name (Leave blank when done):
10:00:00:60:69:80:05:14
Enter peer secret:
Re-enter peer secret:
Enter local secret:
Re-enter local secret:
Enter WWN, Domain, or switch name (Leave blank when done):
Are you done? (yes, y, no, n): [no]
y
Saving data to key store... Done.
Summary of Contents for AE370A - Brocade 4Gb SAN Switch 4/12
Page 18: ...18 ...
Page 82: ...82 Managing user accounts ...
Page 102: ...102 Configuring standard security features ...
Page 126: ...126 Maintaining configurations ...
Page 198: ...198 Routing traffic ...
Page 238: ...238 Using the FC FC routing service ...
Page 260: ...260 Administering FICON fabrics ...
Page 280: ...280 Working with diagnostic features ...
Page 332: ...332 Administering Extended Fabrics ...
Page 414: ...398 Configuring the PID format ...
Page 420: ...404 Configuring interoperability mode ...
Page 426: ...410 Understanding legacy password behaviour ...
Page 442: ...426 ...
Page 444: ......
Page 447: ......