![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/8/61/86149add-f01a-4987-9280-68b329c73b9c/86149add-f01a-4987-9280-68b329c73b9c-bg3e.png)
2–Planning
Security
2-24 59265-02 B
b. Create an ISL group (Group_ISL_1) in Security_Set_1 with Switch_1,
Switch_2, Adapter_1, and JBOD as members, as shown in the
following table:
The Switch_1 secret must be shared with the Switch_2 database.
2. Configure security on Adapter_1 using the appropriate management tool.
Logins between the Switch_1 and Adapter_1 will be challenged for their
respective secrets. Therefore, the secrets for Switch_1 and Adapter_1 that
you configured on Switch_1 must also be configured on Adapter_1.
3. Save and activate Security_Set_1 on Switch_1.
4. Create a security set (Security_Set_2) on Switch_2. Create an ISL group
(Group_ISL_2) in Security_Set_2 with Switch_2 and Switch_1 as members,
as shown in the following table:
5. Save and activate Security_Set_2 on Switch_2.
Switch_1 Node WWN: 10:00:00:c0:dd:07:e3:4c
Authentication: CHAP
Primary Hash: MD5
Primary Secret: 0123456789abcdef
Binding: None
Switch_2 Node WWN: 10:00:00:c0:dd:07:e3:4e
Authentication: CHAP
Primary Hash: MD5
Primary Secret: abcdefabcdef012
Binding: None
Switch_2 Node WWN: 10:00:00:c0:dd:07:e3:4e
Authentication: CHAP
Primary Hash: MD5
Primary Secret: 0123456789abcdef
Binding: None
Switch_1
Node WWN: 10:00:00:c0:dd:07:e3:4c
Authentication: CHAP
Primary Hash: MD5
Secret: abcdefabcdef012
Binding: None