148 Command Reference
group
Description
Creates groups, manages membership within the group, and manages the membership of groups in
security sets.
Authority
Admin session and a Security Edit session. For information about starting a Security Edit session, see
the
security
command. The
list
,
members
,
securitysets
, and
type
operands are
available without an Admin session.
Syntax
group
add [group]
copy [group_source] [group_destination]
create [group]
[type]
delete [group]
edit [group] [member]
list
members [group]
remove [group] [member_list]
rename [group_old] [group_new]
securitysets [group]
type [group]
Operands
add [group]
Initiates an editing session in which to specify a group member and its attributes for the existing
group given by [group]. ISL, Port, and MS member attributes are described in
Table 8
,
Table 9
,
and
Table 10
respectively. The group name and group type attributes are read-only fields
common to all three tables.
Table 8
ISL group member attributes
Attribute
Description
Member
Worldwide name of the switch that would attach to the switch. A member
cannot belong to more than one group.
Authentication
Enables (
Chap
) or disables (
None
) authentication using the Challenge
Handshake Authentication Protocol (CHAP). The default is
None
.
PrimaryHash
The preferred hash function to use to decipher the encrypted primary secret
sent by the ISL member. The hash functions are MD5 or SHA-1. If the ISL
member does not support the primary hash, the switch will use the
secondary hash.
PrimarySecret
Hexadecimal string that is encrypted by the primary hash for
authentication with the ISL group member. The string has the following
lengths depending on the primary hash function:
•
MD5 hash: 16-byte
•
SHA-1 hash: 20-byte
SecondaryHash
Hash function to use to decipher the encrypted secondary secret sent by
the ISL group member. Hash values are
MD5
or
SHA-1
. The secondary
hash is used when the primary hash is not available on the ISL group
member. The primary hash and the secondary hash cannot be the same.
Summary of Contents for StorageWorks SN6000
Page 16: ...16 Command Line Interface Usage ...
Page 20: ...20 User Account Configuration ...
Page 34: ...34 Network Configuration ...
Page 82: ...82 Zoning Configuration ...
Page 86: ...86 Connection Security Configuration ...
Page 96: ...96 Device Security Configuration ...
Page 100: ...100 RADIUS Server Configuration ...
Page 124: ...124 Simple Network Management Protocol Configuration ...
Page 318: ...318 Command Reference ...
Page 330: ...330 Index ...