beautypg.com

Switch configuration, Supported ldap options – Brocade Fabric OS Administrators Guide (Supporting Fabric OS v7.3.0) User Manual

Page 149

background image

Switch configuration

By default, the remote authentication services are disabled, so AAA services default to the switch’s local
database.

To enable remote authentication, it is strongly recommended that you access the CLI through an SSH
connection so that the shared secret is protected. Multiple login sessions can configure simultaneously,
and the last session to apply a change leaves its configuration in effect. After a configuration is applied,
it persists after a reboot or an HA failover.

To enable the secure LDAP service, you must install a certificate from the Microsoft Active Directory
server or the OpenLDAP server. By default, the LDAP service does not require certificates.

The configuration applies to all switches. On a Backbone, the configuration replicates itself on a standby
CP blade if one is present. It is saved in a configuration upload and applied in a configuration download.

Brocade recommends configuring at least two authentication servers, so that if one fails, the other will
assume service. Up to five servers are supported.

You can set the configuration with any one of the supported authentication services and local
authentication enabled, so that if the authentication servers do not respond because of a power failure
or network problems, the switch uses local authentication.

Consider the effects of the use of a remote authentication service on other Fabric OS features. For
example, when a remote authentication service is enabled, all account passwords must be managed on
the authentication server. The Fabric OS mechanisms for changing switch passwords remain functional;
however, such changes affect only the involved switches locally. They do not propagate to the
authentication server, nor do they affect any account on the authentication server. Authentication
servers also support notifying users of expiring passwords.

When RADIUS, LDAP, or TACACS+ is set up for a fabric that contains a mix of switches with and
without RADIUS, LDAP, and TACACS+ support, the way a switch authenticates users depends on
whether a RADIUS, LDAP, or TACACS+ server is set up for that switch. For a switch with remote
authentication support and configuration, authentication bypasses the local password database. For a
switch without remote authentication support or configuration, authentication uses the switch’s local
account names and passwords.

Supported LDAP options

The following table summarizes the various LDAP options and Brocade support for each.

LDAP options

TABLE 23

Protocol

Description

Channel type Default port URL

Brocade
supported?

LDAPv3

LDAP over TCP

Unsecured

389

ldap://

No

LDAPv3 with TLS
extension

LDAPv3 over TLS

Secured

389

ldap://

Yes

LDAPv3 with TLS
and Certificate

LDAPv3 over TLS channel and
authenticated using a certificate

Secured

389

ldap://

Yes

LDAPv2 with SSL

5

LDAPv2 over SSL. Port 636 is
used for SSL. Port 389 is for
connecting to LDAP.

Secured

636 and 389 ldaps:// No

5

This protocol was deprecated in 2003 when LDAPv3 was standardized.

Switch configuration

Fabric OS Administrators Guide

149

53-1003130-01