Q-Logic 5800V Manuel D’Utilisation

Page de 134
2–Planning
Security
2-30
59265-02  B
To secure the management server on Switch_2 from unauthorized access by an 
adapter or an associated host application:
1.
Create a security set (Security_Set_2) on Switch_2.
2.
Create a management server group (Group_1) in Security_Set_2 with 
Switch_2 and Adapter_2 or APP_2 as its member. You must specify 
adapters by node WWN. Switches can be specified by port or node WWN. 
The type of switch WWN you use in the switch security database must be 
the same as that in the adapter security database. For example, if you 
specify a switch with a port WWN in the switch security database, you must 
also specify that switch in the adapter security database with the same port 
WWN. For MD5 authentication, create secrets, as shown in the following:
3.
Configure security on Adapter_2 or APP_2 using the appropriate 
management tool. Logins between the Switch_2 and Adapter_2 or APP_2 
will be challenged (MD5) for their respective secrets. Therefore, the secrets 
that you configured for Adapter_2 or APP_2 on Switch_2 must also be 
configured on Adapter_2 or APP_2.
4.
Save and activate Security_Set_2.
                                                                                           
Switch_2
Node WWN: 10:00:00:c0:dd:07:c3:4e
CT Authentication: True
Hash: MD5
Secret: 9876543210fedcba9
Adapter_2 or 
APP_2
Node WWN: 10:00:00:c0:dd:07:c3:4d
CT Authentication: True
Hash: MD5
Secret: fedcba9876543210