Q-Logic 5800V Switch User Manual


 
3 – Planning
Security
3-22 59265-02 A
S
Security Example: RADIUS Server
Consider the fabric shown in Figure 3-10. This fabric is similar to the one shown in
Figure 3-9 with the addition of Radius_1 acting as a RADIUS server. Authorization
and authentication is passed from the switch to Radius_1 in the following cases:
HBA_1 login to Switch_1
Switch_1 login to Switch_2
Switch_2 login to Switch_1
Figure 3-10 Security Example: RADIUS Server
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: HBA_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port
F_Port
F_Port
Server: Radius_1
IP Address:10:20:30:40
Device: HBA_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No