A SERVICE OF

logo

2–Planning
Security
2-30 59265-02 B
To secure the management server on Switch_2 from unauthorized access by an
adapter or an associated host application:
1. Create a security set (Security_Set_2) on Switch_2.
2. Create a management server group (Group_1) in Security_Set_2 with
Switch_2 and Adapter_2 or APP_2 as its member. You must specify
adapters by node WWN. Switches can be specified by port or node WWN.
The type of switch WWN you use in the switch security database must be
the same as that in the adapter security database. For example, if you
specify a switch with a port WWN in the switch security database, you must
also specify that switch in the adapter security database with the same port
WWN. For MD5 authentication, create secrets, as shown in the following:
3. Configure security on Adapter_2 or APP_2 using the appropriate
management tool. Logins between the Switch_2 and Adapter_2 or APP_2
will be challenged (MD5) for their respective secrets. Therefore, the secrets
that you configured for Adapter_2 or APP_2 on Switch_2 must also be
configured on Adapter_2 or APP_2.
4. Save and activate Security_Set_2.
Switch_2 Node WWN: 10:00:00:c0:dd:07:c3:4e
CT Authentication: True
Hash: MD5
Secret: 9876543210fedcba9
Adapter_2 or
APP_2
Node WWN: 10:00:00:c0:dd:07:c3:4d
CT Authentication: True
Hash: MD5
Secret: fedcba9876543210