user manual
Table Of Contents
- Table of Contents
- Section 1 Introduction
- Section 2 Command Line Interface Usage
- Section 3 User Account Configuration
- Section 4 Network and Fabric Configuration
- Section 5 Switch Configuration
- 5.1 Displaying Switch Information
- 5.2 Managing Switch Services
- 5.3 Managing Switch Configurations
- 5.4 Paging a Switch
- 5.5 Setting the Date and Time
- 5.6 Resetting a Switch
- 5.7 Installing Firmware
- 5.8 Managing Switch Feature Upgrades
- Section 6 Port Configuration
- Section 7 Zoning Configuration
- Section 8 Connection Security Configuration
- Section 9 Device Security Configuration
- Section 10 RADIUS Server Configuration
- Section 11 Event Log Configuration
- Section 12 Simple Network Management Protocol Configuration
- Section 13 Command Reference
- 13.1 Access Authority
- 13.2 Syntax and Keywords
- 13.3 Notes and Examples
- 13.4 Command Listing
- Admin
- Alias
- Config
- Create
- Date
- Exit
- Fcping
- Fctrace
- Feature
- Firmware Install
- Group
- Hardreset
- Help
- History
- Hotreset
- Image
- Lip
- Logout
- Passwd
- Ping
- Ps
- Quit
- Reset
- Security
- Securityset
- Set Alarm
- Set Beacon
- Set Config Port
- Set Config Security
- Set Config Security Portbinding
- Set Config Switch
- Set Config Threshold
- Set Config Zoning
- Set Log
- Set Pagebreak
- Set Port
- Set Setup Radius
- Set Setup Services
- Set Setup SNMP
- Set Setup System
- Set Switch State
- Set Timezone
- Show About
- Show Alarm
- Show Broadcast
- Show Chassis
- Show Config Port
- Show Config Security
- Show Config Security Portbinding
- Show Config Switch
- Show Config Threshold
- Show Config Zoning
- Show Domains
- Show Donor
- Show Fabric
- Show FDMI
- Show Interface
- Show Log
- Show LSDB
- Show Media
- Show Mem
- Show NS
- Show Pagebreak
- Show Perf
- Show Port
- Show Post Log
- Show Setup Mfg
- Show Setup Radius
- Show Setup Services
- Show Setup SNMP
- Show Setup System
- Show Steering
- Show Switch
- Show Timezone
- Show Topology
- Show Users
- Show Version
- Shutdown
- Test Cancel
- Test Port
- Test Status
- Uptime
- User
- Whoami
- Zone
- Zoneset
- Zoning
- Index

59183-01 A 9-1
Section 9
Device Security Configuration
This section describes the following tasks:
Displaying Security Database Information
Configuring the Security Database
Modifying the Security Database
Resetting the Security Database
Managing Security Sets
Managing Groups
Device security provides for the authorization and authentication of devices that
you attach to a switch. You can configure a switch with a group of devices against
which the switch authorizes new attachments by devices, other switches, or
devices issuing management server commands.
Device security is defined through the use of security sets and groups. A group is
a list of device worldwide names that are authorized to attach to a switch. There
are three types of groups: one for other switches (ISL), another for devices (port),
and a third for devices issuing management server commands (MS). A security
set is a set of up to three groups with no more than one of each group type. The
security database is made up of all security sets on the switch.
In addition to authorization, the switch can be configured to require authentication
to validate the identity of the connecting switch, device, or host. Authentication
can be performed locally using the switch’s security database, or remotely using a
Remote Dial-In User Service (RADIUS) server such as Microsoft® RADIUS.
NOTE: Device security requires the Fabric Security license key. To purchase a
license key, contact your authorized maintenance provider or
authorized reseller.