Chapter 4 Managing Fabric Security 91
Primary Hash — the primary algorithm used first to authenticate the
communication link. If the primary algorithm is not supported on the
authentication initiator end of the link, the secondary algorithm is used. If
there is no common algorithm (either primary or secondary) configured
between the two ends of the link, the link will isolate.
Secondary Hash — the secondary algorithm used to authenticate the
communication link. If there is no common algorithm (either primary or
secondary) configured between the two ends of the link, the link will isolate.
The (two) Secret fields are disabled if authentication is None. If authentication
is Chap, the Secret fields are enabled.
The Generate button is only enabled when authentication is Chap.
The domain ID of the Group Member world wide name. Valid range is 1–239.
Entering 0 (zero) is considered a null character, resulting in no domain ID
binding.
The conventions for Port security group members are listed below:
You can enter member world wide name (WWN), which must be 16 hex
characters, or 23 characters with valid WWN format xx:xx:xx:xx:xx:xx:xx:xx.
The authentication choices are None and Chap.
Primary Hash and Secondary Hash fields:
Primary Hash — the primary algorithm used first to authenticate the
communication link. If the primary algorithm is not supported on the
authentication initiator end of the link, the secondary algorithm is used. If
there is no common algorithm (either primary or secondary) configured
between the two ends of the link, the link will isolate.
Secondary Hash — the secondary algorithm used to authenticate the
communication link. If there is no common algorithm (either primary or
secondary) configured between the two ends of the link, the link will isolate.
Primary Secret and Secondary Secret fields:
Enter an authentication "password" to be assigned to that member. Or, you
can click the Generate buttons to randomly generate secrets.
Both Secret fields are disabled if authentication is None. If authentication is
Chap, the Secret fields are enabled.
The Generate button is only enabled when authentication is Chap.
Confirm Primary and Confirm Secondary fields:
Confirm Primary — re-enter the primary hash key to validate the primary
secret.
Confirm Secondary — re-enter the secondary hash key to validate the
secondary secret.
The conventions for MS security group members are listed below: