Q-Logic 5600 Manuel D’Utilisation
A – Command Line Interface
Group Command
A-28
59097-02 B
S
Table A-6. Port Group Member Attributes
Attribute
Description
Member
Port worldwide name for the N_Port device that would attach to the
switch. A member cannot belong to more than one group.
switch. A member cannot belong to more than one group.
Authentication
Enables (CHAP) or disables (None) authentication using the Chal-
lenge Handshake Authentication Protocol (CHAP). The default is
None.
lenge Handshake Authentication Protocol (CHAP). The default is
None.
Primary Hash
The preferred hash function to use to decipher the encrypted Pri-
mary Secret sent by the Port group member. The hash functions are
MD5 or SHA-1. If the Port group member does not support the Pri-
mary Hash, the switch will use the Secondary Hash.
mary Secret sent by the Port group member. The hash functions are
MD5 or SHA-1. If the Port group member does not support the Pri-
mary Hash, the switch will use the Secondary Hash.
Primary Secret
Hexadecimal string that is encrypted by the Primary Hash for
authentication with the Port group member. The string has the fol-
lowing lengths depending on the Primary Hash function:
authentication with the Port group member. The string has the fol-
lowing lengths depending on the Primary Hash function:
MD5 hash: 16-byte
SHA-1 hash: 20-byte
SHA-1 hash: 20-byte
Secondary Hash
Hash function to use to decipher the encrypted Secondary Secret
sent by the Port group member. Hash values are MD5 or SHA-1.
The Secondary Hash is used when the Primary Hash is not avail-
able on the Port group member. The Primary Hash and the Second-
ary Hash cannot be the same.
sent by the Port group member. Hash values are MD5 or SHA-1.
The Secondary Hash is used when the Primary Hash is not avail-
able on the Port group member. The Primary Hash and the Second-
ary Hash cannot be the same.
Secondary
Secret
Secret
Hex string that is encrypted by the Secondary Hash and sent for
authentication. The string has the following lengths depending on
the Secondary Hash function:
authentication. The string has the following lengths depending on
the Secondary Hash function:
MD5 hash: 16-byte
SHA-1 hash: 20-byte
SHA-1 hash: 20-byte