Sun Microsystems 5602 User Manual
Page 4
Page iv
59097-01 A
SANbox 5602 Switch Management
User’s Guide
0
Working with Switches and Links ............................................................ 2-26
Selecting Switches and Links ......................................................... 2-26
Arranging Switches in the Display .................................................. 2-26
Opening the Faceplate and Topology Display Popup Menus ......... 2-27
Selecting Ports................................................................................ 2-29
Opening the Faceplate Popup Menu.............................................. 2-29
Faceplate Data Windows......................................................................... 2-30
Removing a RADIUS Server ..................................................................... 3-4
Editing RADIUS Server Information .......................................................... 3-5
Modifying Authentication Order RADIUS Server Information .................... 3-6
Security Consistency Checklist ................................................................. 3-8
Edit Security Dialog ........................................................................ 3-10
Creating a Security Set................................................................... 3-11
Create Security Group Dialog......................................................... 3-12
Creating a Security Group .............................................................. 3-13
Create Security Group Member Dialog........................................... 3-14
Creating a Security Group Member................................................ 3-15
Editing the Security Configuration on a Switch............................... 3-16
Viewing Properties of a Security Set, Group, or Member ............... 3-17
Using the Security Config Dialog.................................................... 3-17
Archiving a Security Configuration to a File.................................... 3-18
Activating a Security Set................................................................. 3-18
Deactivating a Security Set ............................................................ 3-18
Configured Security Data Window.................................................. 3-19
Active Security Data Window.......................................................... 3-19