3 – Planning
Fabric Security
3-20 59096-02 C
S
3.7.2.2
Security Example: RADIUS Server
Consider the fabric shown in Figure 3-8. This fabric is similar to the one shown in
Figure 3-7 with the addition of Radius_1 acting as a RADIUS server. Authorization
and authentication is passed from the switch to Radius_1 in the following cases:
HBA_1 login to Switch_1
Switch_1 login to Switch_2
Switch_2 login to Switch_1
Figure 3-8. Security Example: RADIUS Server
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: HBA_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port
F_Port
F_Port
Server: Radius_1
IP Address:10:20:30:40
Device: HBA_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No