A SERVICE OF

logo

2–Planning
Security
2-26 59265-02 B
To secure F_Ports and E_Ports, and pass authorization and authentication to a
RADIUS server:
1. Configure the Radius_1 host as a RADIUS server on Switch_1 and
Switch_2 to authenticate device logins, as shown in the following table:
Specify the server IP address and the secret with which the switches will
authenticate with the server. Configure the switches so that devices
authenticate through the switches only if the RADIUS server is unavailable.
2. Create a security set (Security_Set_1) on Switch_1.
a. Create a port group (Group_Port_1) in Security_Set_1 with Switch_1
and Adapter_1 as members, as shown in the following:
Device Authentication
Order
RadiusLocal—Authenticate devices using the
RADIUS server security database first. If the RADIUS
server is unavailable, use the local switch security
database.
Total Servers 1—Enables support for one RADIUS server
Device Authentication
Server
True—Enables Radius_1 to authenticate device log-
ins.
Server IP Address 10.20.30.40
Secret 1234567890123456—16-character ASCI string (MD5
hash). This is the secret that allows direct communica-
tion with the RADIUS server.
Switch_1 Node WWN: 10:00:00:c0:dd:07:e3:4c
Authentication: CHAP
Primary Hash: MD5
Primary Secret: 0123456789abcdef
Adapter_1 Node WWN: 10:00:00:c0:dd:07:c3:4d
Authentication: CHAP
Primary Hash: MD5
Primary Secret: fedcba9876543210