EasyManua.ls Logo

Fujitsu Eternus DX80 S2 - User Authentication; Table 5.1 Type of Client Public Key

Fujitsu Eternus DX80 S2
97 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 5 Basic Functions
5.2 Security
ETERNUS DX80 S2/DX90 S2 Disk storage system Overview
Copyright 2013 FUJITSU LIMITED P3AM-4812-11ENZ0
53
5.2.2 User Authentication
Internal Authentication and External Authentication are available as logon authentication methods. RADIUS
authentication can be used for External Authentication.
Internal Authentication
Internal Authentication is performed using the authentication function of the ETERNUS DX Disk storage
system.
The following authentication functions are available when the ETERNUS DX Disk storage system is connected
via a LAN using operation management software.
User account authentication
User account authentication uses the user account information that is registered in the ETERNUS DX Disk
storage system to verify user logins. Up to 64 user accounts can be set.
SSL authentication
ETERNUS Web GUI supports https connections using SSL/TLS. Since data on the network is encrypted,
security can be ensured. Server certifications that are required for connection are obtained by installing
authenticated certifications or by being automatically created in the ETERNUS DX Disk storage system.
SSH authentication
Since ETERNUS CLI supports SSH connections, data on the network can be encrypted and sent/received. The
server key for SSH varies depending on the ETERNUS DX Disk storage system. When the server certification
is updated, the server key is updated as well.
Password authentication and client public key authentication are available as authentication methods for
SSH connections.
The following table shows the supported client public keys.
Table 5.1 Type of client public key
The following iSCSI authentication is available for a host connection and remote copy.
iSCSI authentication
The Challenge Handshake Authentication Protocol (CHAP) is supported for iSCSI connections. For CHAP
Authentication, unidirectional CHAP or bidirectional CHAP can be selected. When unidirectional CHAP is
used, the target authenticates the initiator to prevent fraudulent access. When bidirectional CHAP is used,
the target authenticates the initiator to prevent fraudulent access and the initiator authenticates the
target to prevent impersonation. CHAP is supported by host connections (iSCSI-CA) and REC connections
(iSCSI-RA). In addition, Internet Storage Name Service (iSNS) is supported as the iSCSI name solution.
Type of public key Complexity (bits)
OpenSSH style RSA for SSH v1 1024, 2048, 4096
IETF style DSA for SSH v2 1024, 2048, 4096
IETF style RSA for SSH v2 1024, 2048, 4096

Table of Contents

Other manuals for Fujitsu Eternus DX80 S2

Related product manuals