59183-02 A 9-1Section 9Device Security ConfigurationThis section describes the following tasks: Displaying Security Database Information Configuring the Security Database Modifying the Security Database Resetting the Security Database Managing Security Sets Managing GroupsDevice security provides for the authorization and authentication of devices thatyou attach to a switch. You can configure a switch with a group of devices againstwhich the switch authorizes new attachments by devices, other switches, ordevices issuing management server commands.Device security is defined through the use of security sets and groups. A group isa list of device worldwide names that are authorized to attach to a switch. Thereare three types of groups: one for other switches (ISL), another for devices (port),and a third for devices issuing management server commands (MS). A securityset is a set of up to three groups with no more than one of each group type. Thesecurity database is made up of all security sets on the switch.In addition to authorization, the switch can be configured to require authenticationto validate the identity of the connecting switch, device, or host. Authenticationcan be performed locally using the switch’s security database, or remotely using aRemote Dial-In User Service (RADIUS) server such as Microsoft® RADIUS.NOTE:Device security requires the Fabric Security license key. To purchase alicense key, contact your authorized maintenance provider or authorizedreseller.