Q-Logic 9100 TV Video Accessories User Manual


 
2–Planning
Security
2-18 59229-05 A
Security Example: RADIUS Server
Consider the fabric shown in Figure 2-3. This fabric is similar to the one shown in
Figure 2-2 with the addition of Radius_1 acting as a RADIUS server. Authorization
and authentication is passed from the switch to Radius_1 in the following cases:
HBA_1 login to Switch_1
Switch_1 login to Switch_2
Switch_2 login to Switch_1
Figure 2-3 Security Example: RADIUS Server
E_Port
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: HBA_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port
F_Port
F_Port
Device: HBA_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No
Server: Radius_1
IP Address:10:20:30:40