McDATA® 4Gb SAN Switch for HP p-Class BladeSystem Command Line Interface Guide (AA-RWEJA-TE, November 2006)
McDATA® 4Gb SAN Switch for HP p-Class BladeSystem command line interface guide 115
Secondary
Hash
Hash function to use to decipher the encrypted Secondary Secret sent by the Port
group member. Hash values are MD5 or SHA-1. The Secondary Hash is used
when the Primary Hash is not available on the Port group member. The Primary
Hash and the Secondary Hash cannot be the same.
NOTE: Secondary Hash is not supported when connecting to other
McDATA products.
Secondary
Secret
Hex string that is encrypted by the Secondary Hash and sent for authentication.
The string has the following lengths depending on the Secondary Hash function:
• MD5 hash: 16-byte
• SHA-1 hash: 20-byte
NOTE: Secondary Secret is not supported when connecting to other
McDATA products.
Table 7 Port Group member attributes (Continued)
Attribute Description
Table 8 MS Group member attributes
Attribute Description
Member WWPN for the N_Port device that would attach to the switch
CTAuthentication Common Transport (CT) authentication. Enables (True) or disables (False)
authentication for MS group members. The default is False.
Hash The hash function to use to decipher the encrypted Secret sent by the MS group
member. Hash values are MD5 or SHA-1.
Secret Hexadecimal string that is encrypted by the Hash function for authentication with
MS group members. The string has the following lengths depending on the Hash
function:
MD5 hash: 16-byte
SHA-1 hash: 20-byte
copy [group_source] [group_destination]
Creates a new group named [group_destination] and copies the membership into it from
the group given by [group_source].
create [group] [type]
Creates a group with the name given by [group] with the type given by [type]. A group
name must begin with a letter and be no longer than 64 characters. Valid characters are 0—9,
A—Z, a—z, _, $, ^, and -. The security database supports a maximum of 16 groups. If you omit
[type], ISL is used. [type] can be one of the following:
ISL
Configures security for attachments to other switches.
Port
Configures security for attachments to N_Port devices.
MS
Configures security for attachments to N_Port devices that are issuing management server
commands.