2–Planning
Security
59265-02 B 2-27
Observe the following rules:
Switch_1 and all devices and switches connected to Switch_1
must be included in the group even if the switch or device does
not support authentication. Otherwise, the Switch_1 port will
become isolated from the fabric.
You must specify adapters by node WWN. Switches can be
specified by port or node WWN. The type of switch WWN you
use in the switch security database must be the same as that in
the adapter security database. For example, if you specify a
switch with a port WWN in the switch security database, you
must also specify that switch in the adapter security database
with the same port WWN.
For CHAP authentication, create 32-character hexadecimal or
16-character ASCI secrets. The switch secret must be shared
with the adapter security database.
b. Create an ISL group (Group_ISL_1) in Security_Set_1 with Switch_1
and Switch_2 as members, as shown in the following. The Switch_1
secret must be shared with the Switch_2 security database.
3. Configure security on Adapter_1 using the appropriate management tool.
Logins between the Switch_1 and Adapter_1 will be challenged (CHAP) for
their respective secrets. Therefore, the secrets for Switch_1 and Adapter_1
that you configured on Switch_1 must also be configured on Adapter_1.
4. Save and activate Security_Set_1 on Switch_1.
Switch_1 Node WWN: 10:00:00:c0:dd:07:e3:4c
Authentication: CHAP
Primary Hash: MD5
Primary Secret: 0123456789abcdef
Binding: None
Switch_2 Node WWN: 10:00:00:c0:dd:07:e3:4e
Authentication: CHAP
Primary Hash: MD5
Primary Secret: abcdefabcdef012
Binding: None