2–Planning
Security
59265-02 B 2-25
Security Example: RADIUS Server
Consider the fabric shown in Figure 2-10. This fabric is similar to the one shown in
Figure 2-9 with the addition of Radius_1 acting as a RADIUS server. Authorization
and authentication are passed from the switch to Radius_1 in the following cases:
Adapter_1 log in to Switch_1
Switch_1 log in to Switch_2
Switch_2 log in to Switch_1
Figure 2-10. Security Example: RADIUS Server
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Adapter_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port F_Port
F_Port
Server: Radius_1
IP Address:10:20:30:40
Device: Adapter_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No