copy [group_source] [group_destination]

Creates a new group named [group_destination] and copies the membership into it from the group given by [group_source].

create [group] [type]

Creates a group with the name given by [group] with the type given by [type]. A group name must begin with a letter and be no longer than 64 characters. Valid characters are 0—9, A—Z, a—z, _, $, ^, and -. The security database supports a maximum of 16 groups. If you omit [type], ISL is used. [type] can be one of the following:

ISL

Configures security for attachments to other switches.

Port

Configures security for attachments to N_Port devices.

MS

Configures security for attachments to N_Port devices that are issuing management server commands.

edit [group] [member]

Initiates an editing session in which to change the attributes of a World Wide Name given by [member] in a group given by [group]. Member attributes that can be changed are described in Table 34:

Table 34 Group member attributes

Attribute

Description

 

 

Authentication

Enables (CHAP) or disables (None) authentication using Challenge

(ISL and Port Groups)

Handshake Authentication Protocol. The default is None.

 

 

 

CTAuthentication

CT authentication. Enables (True) or disables (False) authentication for MS

(MS Groups)

group members. The default is False.

 

 

 

Primary Hash

The preferred hash function to use to decipher the encrypted Primary Secret

(ISL and Port Groups)

sent by the member. The hash functions are MD5 or SHA-1. If the member

does not support the Primary Hash, the switch will use the Secondary Hash.

 

 

 

Hash

The hash function to use to decipher the encrypted Secret sent by the MS

(MS Groups)

group member. Hash values are MD5 or SHA-1.

 

 

 

Primary Secret

Hexadecimal string that is encrypted by the Primary Hash for authentication

(ISL and Port Groups)

with the member. The string has the following lengths depending on the

Primary Hash function:

 

 

MD5 hash: 16-byte

 

SHA-1 hash: 20-byte

 

 

Secondary Hash

Hash function to use to decipher the encrypted Secondary Secret sent by

(ISL and Port Groups)

the group member. Hash values are MD5 or SHA-1. The Secondary Hash

is used when the Primary Hash is not available on the group member. The

 

 

Primary Hash and the Secondary Hash cannot be the same.

 

 

Secondary Secret

Hex string that is encrypted by the Secondary Hash and sent for

(ISL and Port Groups)

authentication. The string has the following lengths depending on the

Secondary Hash function:

 

 

MD5 hash: 16-byte

 

SHA-1 hash: 20-byte