Справочник Пользователя для Q-Logic 5800V

Скачать
Страница из 134
2–Planning
Security
59265-02  B
2-25
Security Example: RADIUS Server
Consider the fabric shown in 
. This fabric is similar to the one shown in 
 with the addition of Radius_1 acting as a RADIUS server. Authorization 
and authentication are passed from the switch to Radius_1 in the following cases:
Adapter_1 log in to Switch_1
Switch_1 log in to Switch_2
Switch_2 log in to Switch_1
Figure 2-10. Security Example: RADIUS Server
                                                                                           
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Adapter_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port
F_Port
F_Port
Server: Radius_1
IP Address:10:20:30:40
Device: Adapter_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No