Cisco DCNM-SAN Web Client Authentication

Cisco DCNM-SAN Web Server does not communicate directly with any switches in the fabric. Cisco DCNM-SAN Web Server uses its own user name and password combination that is either stored locally or stored remotely on an AAA server.

We recommend that you use a RADIUS or TACACS+ server to authenticate users in Cisco DCNM-SAN Web Server.

DETAILED STEPS

  1. Launch Cisco DCNM-SAN Web Client.
  2. Choose Admin > Management Users > Remote AAA to update the authentication used by Cisco DCNM-SAN Web Client.
  3. Set the authentication mode attribute to radius.
  4. Set the RADIUS server name, shared secret, authentication method, and ports used for up to three RADIUS servers.
  5. Click Modify to save this information.
  6. Launch Cisco DCNM-SAN Web Client.
  7. Choose Admin > Management Users > Remote AAA to update the authentication used by Cisco DCNM-SAN Web Client.
  8. Set the authentication mode attribute to tacacs.
  9. Set the TACACS+ server name, shared secret, authentication method, and port used for up to three TACACS+ servers.
  10. Click Modify to save this information.

Note     Cisco DCNM-SAN does not support SecureID because it is not compatible with SNMP authentication. Cisco DCNM-SAN uses the same login credentials for all the switches in a fabric. Since SecureID cannot be used more than once for authentication, Cisco DCNM-SAN will not be able to establish a connection to the second switch using a SecureID.



Copyright 2010-2013, Cisco Systems, Inc. All rights reserved.