Sun Microsystems 5802 用户手册

下载
页码 232
Chapter 4
Managing Fabric Security
91
Primary Hash
 — the primary algorithm used first to authenticate the 
communication link. If the primary algorithm is not supported on the 
authentication initiator end of the link, the secondary algorithm is used. If 
there is no common algorithm (either primary or secondary) configured 
between the two ends of the link, the link will isolate.
Secondary Hash
 — the secondary algorithm used to authenticate the 
communication link. If there is no common algorithm (either primary or 
secondary) configured between the two ends of the link, the link will isolate.
The (two) Secret fields are disabled if authentication is None. If authentication 
is Chap, the Secret fields are enabled.
The Generate button is only enabled when authentication is Chap.
The domain ID of the Group Member world wide name. Valid range is 1–239. 
Entering 0 (zero) is considered a null character, resulting in no domain ID 
binding.
The conventions for Port security group members are listed below: 
You can enter member world wide name (WWN), which must be 16 hex 
characters, or 23 characters with valid WWN format xx:xx:xx:xx:xx:xx:xx:xx.
The authentication choices are None and Chap.
Primary Hash and Secondary Hash fields:
Primary Hash
 — the primary algorithm used first to authenticate the 
communication link. If the primary algorithm is not supported on the 
authentication initiator end of the link, the secondary algorithm is used. If 
there is no common algorithm (either primary or secondary) configured 
between the two ends of the link, the link will isolate.
Secondary Hash
 — the secondary algorithm used to authenticate the 
communication link. If there is no common algorithm (either primary or 
secondary) configured between the two ends of the link, the link will isolate.
Primary Secret and Secondary Secret fields:
Enter an authentication "password" to be assigned to that member. Or, you 
can click the Generate buttons to randomly generate secrets.
Both Secret fields are disabled if authentication is None. If authentication is 
Chap, the Secret fields are enabled.
The Generate button is only enabled when authentication is Chap.
Confirm Primary and Confirm Secondary fields:
Confirm Primary
 — re-enter the primary hash key to validate the primary 
secret. 
Confirm Secondary
 — re-enter the secondary hash key to validate the 
secondary secret. 
The conventions for MS security group members are listed below: