{"id":126893,"date":"2024-10-19T05:41:57","date_gmt":"2024-10-19T05:41:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-14165-4322022\/"},"modified":"2024-10-24T23:22:45","modified_gmt":"2024-10-24T23:22:45","slug":"bs-iso-iec-14165-4322022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-14165-4322022\/","title":{"rendered":"BS ISO\/IEC 14165-432:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 2 Normative references <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 3 Terms, definitions, symbols, abbreviated terms, and conventions 3.1 Terms and definitions <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 3.2 Symbols and abbreviated terms <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 3.3 Editorial conventions Tables Table 1 \u2013 ISO and American conventions <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 3.4 Keywords <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 3.5 T10 Vendor ID 3.6 Sorting <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 3.7 Terminate communication <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 3.8 State machine notation 3.9 Using numbers in hash functions and concatenation functions Figures Figure 1 \u2013 State machine example <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4 Structure and Concepts 4.1 Overview 4.2 FC-SP-2 Compliance 4.3 Fabric Security Architecture 4.4 Authentication Infrastructure <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 4.5 Authentication Figure 2 \u2013 Relationship between Authentication Protocols and Security Associations <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 4.6 Security Associations 4.7 Cryptographic Integrity and Confidentiality 4.7.1 Overview <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 4.7.2 ESP_Header Processing Figure 3 \u2013 Logical Model for Integrity and Confidentiality Protection with ESP_Header <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 4.7.3 CT_Authentication Processing <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Figure 4 \u2013 Logical Model for Integrity and Confidentiality Protection with CT_Authentication <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 4.8 Authorization (Access Control) 4.8.1 Policy Definition 4.8.2 Policy Enforcement <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 4.8.3 Policy Distribution 4.8.4 Policy Check 4.9 Name Format Table 2 \u2013 Name Format <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 5 Authentication Protocols 5.1 Overview Figure 5 \u2013 A Generic Authentication Transaction <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5.2 Authentication Messages Structure 5.2.1 Overview <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 5.2.2 SW_ILS Authentication Messages Table 3 \u2013 AUTH_ILS Message Format Table 4 \u2013 AUTH_ILS Flags <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 5.2.3 ELS Authentication Messages Table 5 \u2013 B_AUTH_ILS Message Format Table 6 \u2013 AUTH_ELS Message Format Table 7 \u2013 AUTH_ELS Flags <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 5.2.4 Fields Common to All AUTH Messages Table 8 \u2013 AUTH Message Codes <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 5.2.5 Vendor Specific Messages 5.3 Authentication Messages Common to Authentication Protocols 5.3.1 Overview Table 9 \u2013 Vendor Specific Message Payload Format <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.3.2 AUTH_Negotiate Message Table 10 \u2013 AUTH_Negotiate Message Payload <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 5.3.3 Names used in Authentication Table 11 \u2013 Authentication Protocol Identifiers Table 12 \u2013 AUTH_Negotiate Vendor Specific Protocol Parameters Table 13 \u2013 Names used in Authentication <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 5.3.4 Hash Functions 5.3.5 Diffie-Hellman Groups Table 14 \u2013 Hash Functions Identifiers Table 15 \u2013 Diffie-Hellman Group Identifiers (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 5.3.6 Accepting an AUTH_Negotiate Message 5.3.7 AUTH_Reject Message Table 15 \u2013 Diffie-Hellman Group Identifiers (part 2 of 2) <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Figure 6 \u2013 Example of AUTH_Reject Table 16 \u2013 AUTH_Reject Message Payload Table 17 \u2013 AUTH_Reject Reason Codes <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | Table 18 \u2013 AUTH_Reject Reason Code Explanations Table 19 \u2013 Error Conditions (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 5.3.8 AUTH_Done Message Table 19 \u2013 Error Conditions (part 2 of 2) <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.4 DH-CHAP Protocol 5.4.1 Protocol Operations Figure 7 \u2013 A DH-CHAP Protocol Transaction Example <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Table 20 \u2013 Mathematical Notation for DH-CHAP <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 5.4.2 AUTH_Negotiate DH-CHAP Parameters Table 21 \u2013 AUTH_Negotiate DH-CHAP Protocol Parameters Table 22 \u2013 AUTH_Negotiate DH-CHAP Parameter Format Table 23 \u2013 AUTH_Negotiate DH-CHAP Parameter Tags <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 5.4.3 DHCHAP_Challenge Message Table 24 \u2013 DHCHAP_Challenge Message Payload <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 5.4.4 DHCHAP_Reply Message <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | Table 25 \u2013 DHCHAP_Reply Message Payload <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 5.4.5 DHCHAP_Success Message Table 26 \u2013 DHCHAP_Success Message Payload <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 5.4.6 Key Generation for the Security Association Management Protocol 5.4.7 Reuse of Diffie-Hellman Exponential 5.4.8 DH-CHAP Security Considerations <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 5.5 FCAP Protocol 5.5.1 Protocol Operations Table 27 \u2013 Mathematical Notation for FCAP <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Figure 8 \u2013 A FCAP Protocol Transaction Example <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 5.5.2 AUTH_Negotiate FCAP Parameters Table 28 \u2013 AUTH_Negotiate FCAP Protocol Parameters Table 29 \u2013 AUTH_Negotiate FCAP Parameter Format Table 30 \u2013 AUTH_Negotiate FCAP Parameter Tags <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 5.5.3 FCAP_Request Message Table 31 \u2013 FCAP_Request Message Payload <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | Table 32 \u2013 FCAP Certificate Format Table 33 \u2013 Certificate Formats Table 34 \u2013 FCAP usage of X.509v3 Certificate fields (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Table 34 \u2013 FCAP usage of X.509v3 Certificate fields (part 2 of 2) <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 5.5.4 FCAP_Acknowledge Message Table 35 \u2013 FCAP Nonce Format Table 36 \u2013 Nonce Formats Table 37 \u2013 FCAP_Acknowledge Message Payload <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | Table 38 \u2013 FCAP Signature Format Table 39 \u2013 Signature Formats <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 5.5.5 FCAP_Confirm Message 5.5.6 Key Generation for the Security Association Management Protocol Table 40 \u2013 FCAP_Confirm Message Payload <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 5.5.7 Reuse of Diffie-Hellman Exponential <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 5.6 FCPAP Protocol 5.6.1 Protocol Operations Table 41 \u2013 Mathematical Notation for FCPAP <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | Figure 9 \u2013 A FCPAP Protocol Transaction Example <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 5.6.2 AUTH_Negotiate FCPAP Parameters Table 42 \u2013 AUTH_Negotiate FCPAP Protocol Parameters Table 43 \u2013 AUTH_Negotiate FCPAP Parameter Format Table 44 \u2013 AUTH_Negotiate FCPAP Parameter Tags <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 5.6.3 FCPAP_Init Message Table 45 \u2013 FCPAP_Init Message Payload <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 5.6.4 FCPAP_Accept Message 5.6.5 FCPAP_Complete Message Table 46 \u2013 FCPAP_Accept Message Payload Table 47 \u2013 FCPAP_Complete Message Payload <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 5.6.6 Key Generation for the Security Association Management Protocol 5.6.7 Reuse of Diffie-Hellman Exponential <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 5.7 FCEAP Protocol 5.7.1 Protocol Operations 5.7.2 AUTH_Negotiate FCEAP Parameters Figure 10 \u2013 A FCEAP Protocol Transaction Example <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 5.7.3 FCEAP_Request Message 5.7.4 FCEAP_Response Message Table 48 \u2013 FCEAP_Request Message Payload Table 49 \u2013 FCEAP_Response Message Payload <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 5.7.5 FCEAP_Success Message 5.7.6 FCEAP_Failure Message Table 50 \u2013 FCEAP_Success Message Payload Table 51 \u2013 FCEAP_Failure Message Payload <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 5.7.7 AUTH_Reject Use 5.7.8 AUTH_ELS and AUTH_ILS Size Requirements Figure 11 \u2013 A Failing FCEAP Protocol Transaction Example <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 5.7.9 Supported EAP Methods 5.7.10 Key Generation for the Security Association Management Protocol Table 52 \u2013 Supported EAP Methods <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 5.8 AUTH_ILS Specification 5.8.1 Overview <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 5.8.2 AUTH_ILS Request Sequence Figure 12 \u2013 FC-2 AUTH_ILS Mapping Example for the E_Port to E_Port Case <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 5.8.3 AUTH_ILS Reply Sequence 5.9 B_AUTH_ILS Specification 5.9.1 Overview Table 53 \u2013 AUTH_ILS SW_RJT Reasons Table 54 \u2013 AUTH_ILS SW_ACC Payload <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Figure 13 \u2013 Usage of B_AUTH_ILS <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 5.9.2 B_AUTH_ILS Request Sequence Figure 14 \u2013 FC-2 B_AUTH_ILS Mapping Example <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 5.9.3 B_AUTH_ILS Reply Sequence 5.10 AUTH_ELS Specification 5.10.1 Overview Table 55 \u2013 B_AUTH_ILS SW_RJT Reasons Table 56 \u2013 B_AUTH_ILS SW_ACC Payload <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 5.10.2 AUTH_ELS Request Sequence Figure 15 \u2013 FC-2 AUTH_ELS Mapping Example for the Nx_Port to Nx_Port Case <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 5.10.3 AUTH_ELS Reply Sequence 5.10.4 AUTH_ELS Fragmentation Table 57 \u2013 AUTH_ELS LS_RJT Reasons Table 58 \u2013 AUTH_ELS LS_ACC Payload <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Figure 16 \u2013 AUTH_ELS Fragmentation Process <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | Figure 17 \u2013 Use of the Sequence Number Bit Example <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | Figure 18 \u2013 FC-2 Authentication Mapping with AUTH_ELS Fragmentation Example <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 5.10.5 Authentication and Login Table 59 \u2013 Security Bit Applicability Table 60 \u2013 Security Bit usage with FLOGI <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 5.11 Re-Authentication Table 61 \u2013 Security Bit usage with PLOGI Table 62 \u2013 Login LS_RJT Reasons <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 5.12 Timeouts <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 6 Security Association Management Protocol 6.1 Overview 6.1.1 General Figure 19 \u2013 An SA Management Transaction Example <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | Table 63 \u2013 IKE Payloads Summary <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 6.1.2 IKE_SA_Init Overview 6.1.3 IKE_Auth Overview <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 6.1.4 IKE_Create_Child_SA Overview 6.2 SA Management Messages 6.2.1 General Structure <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 6.2.2 IKE_Header Payload Table 64 \u2013 IKE_Header Payload Format <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 6.2.3 Chaining Header Table 65 \u2013 IKE Flags Table 66 \u2013 Chaining Header Format <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Table 67 \u2013 IKE Payload Type Values <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 6.2.4 AUTH_Reject Message Use 6.3 IKE_SA_Init Message 6.3.1 Overview Table 68 \u2013 Chaining Flags <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 6.3.2 Security_Association Payload Figure 20 \u2013 An IKE_SA_Init exchange Table 69 \u2013 IKE_SA_Init Message Payload <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | Table 70 \u2013 Examples of Proposals <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | Table 71 \u2013 Security_Association Payload Format <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | Table 72 \u2013 Security Protocol Identifiers Table 73 \u2013 Transforms Definition <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | Table 74 \u2013 Transform Type Values <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | Table 75 \u2013 Encryption Algorithms Transform_IDs (Transform Type 1) Table 76 \u2013 Pseudo-random Functions Transform_IDs (Transform Type 2) <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | Table 77 \u2013 Integrity Algorithms Transform_IDs (Transform Type 3) Table 78 \u2013 Diffie-Hellman Group Transform_IDs (Transform Type 4) <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Table 79 \u2013 Mandatory Transform Types Table 80 \u2013 Mandatory and Recommended Transform_IDs (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | Table 80 \u2013 Mandatory and Recommended Transform_IDs (part 2 of 2) <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | Table 81 \u2013 Transform Attributes Definition Table 82 \u2013 Attribute Type Values <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 6.3.3 Key_Exchange Payload 6.3.4 Nonce Payload 6.4 IKE_Auth Message 6.4.1 Overview Table 83 \u2013 Key_Exchange Payload Format Table 84 \u2013 Nonce Payload Format <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Figure 21 \u2013 An IKE_Auth exchange Table 85 \u2013 IKE_Auth Message Payload <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 6.4.2 Encrypted Payload Table 86 \u2013 IKE Payloads Contained in the IKE_Auth Message Table 87 \u2013 Encrypted Payload Format <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 6.4.3 Identification Payload Table 88 \u2013 Identification Payload Format Table 89 \u2013 Type Identifiers <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 6.4.4 Authentication Payload 6.4.5 Traffic Selector Payload Table 90 \u2013 Authentication Payload Format Table 91 \u2013 Authentication Methods Table 92 \u2013 Traffic Selector Payload Format <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | Table 93 \u2013 Traffic Selector Definition Table 94 \u2013 TS Type Identifiers <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 6.4.6 Certificate Payload Table 95 \u2013 Certificate Payload Format <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 6.4.7 Certificate Request Payload Table 96 \u2013 Certificate Encodings <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | Table 97 \u2013 Certificate Request Payload Format <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 6.5 IKE_Create_Child_SA Message Figure 22 \u2013 An IKE_Create_Child_SA exchange <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 6.6 IKE_Informational Message 6.6.1 Overview Table 98 \u2013 IKE_Create_Child_SA Message Payload Table 99 \u2013 IKE Payloads Contained in the IKE_Create_Child_SA Message <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | Figure 23 \u2013 An IKE_Informational exchange Table 100 \u2013 IKE_Informational Message Payload <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | 6.6.2 Notify Payload Table 101 \u2013 IKE Payloads Contained in the IKE_Informational Message Table 102 \u2013 Notify Payload Format <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | Table 103 \u2013 Notify Message Types – Errors (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | Table 103 \u2013 Notify Message Types – Errors (part 2 of 2) <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 6.6.3 Delete Payload Table 104 \u2013 Notify Message Types – Status <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 6.6.4 Vendor_ID Payload Table 105 \u2013 Delete Payload Format <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 6.7 Interaction with the Authentication Protocols 6.7.1 Overview 6.7.2 Concatenation of Authentication and SA Management Transactions Table 106 \u2013 Vendor_ID Payload Format <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 6.7.3 SA Management Transaction as Authentication Transaction Figure 24 \u2013 Concatenation of Authentication and SA Management Transactions <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 6.8 IKEv2 Protocol Details 6.8.1 Use of Retransmission Timers 6.8.2 Use of Sequence Numbers for Message_IDs Figure 25 \u2013 An IKEv2-AUTH Transaction <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 6.8.3 Overlapping Requests 6.8.4 State Synchronization and Connection Timeouts 6.8.5 Cookies and Anti-Clogging Protection 6.8.6 Cryptographic Algorithms Negotiation 6.8.7 Rekeying 6.8.8 Traffic Selector Negotiation <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 6.8.9 Nonces 6.8.10 Reuse of Diffie-Hellman Exponential 6.8.11 Generating Keying Material 6.8.12 Generating Keying Material for the IKE_SA 6.8.13 Authentication of the IKE_SA <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 6.8.14 Generating Keying Material for Child_SAs 6.8.15 Rekeying IKE_SAs using the IKE_Create_Child_SA exchange 6.8.16 IKE_Informational Messages outside of an IKE_SA 6.8.17 Error Handling 6.8.18 Conformance Requirements <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 6.8.19 Rekeying IKE_SAs when Refreshing Authentication <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 7 Fabric Policies 7.1 Policies Definition 7.1.1 Overview Figure 26 \u2013 Policy Data Structures <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | Table 107 \u2013 Policy Objects <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 7.1.2 Names used to define Policies Table 108 \u2013 Names used to define Policies <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 7.1.3 Policy Summary Object Table 109 \u2013 Policy Summary Object Format Table 110 \u2013 Object Flags <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 7.1.4 Switch Membership List Object Table 111 \u2013 Hash Field Format Table 112 \u2013 Hash Formats <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | Table 113 \u2013 Switch Membership List Object Format Table 114 \u2013 Object Flags <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | Table 115 \u2013 Switch Entry Field Format Table 116 \u2013 Basic Switch Attributes Format Table 117 \u2013 Switch Flags <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | Table 118 \u2013 Policy Data Role Table 119 \u2013 Authentication Behavior <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 7.1.5 Node Membership List Object Table 120 \u2013 Node Membership List Object Format <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | Table 121 \u2013 Node Entry Field Format Table 122 \u2013 Basic Node Attribute Format Table 123 \u2013 Node Flags <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | Table 124 \u2013 Common Transport Access Specifier Format Table 125 \u2013 CT Access Descriptor Format Table 126 \u2013 CT Access Flags <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | Table 127 \u2013 Examples of Common Transport Access Specifiers <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 7.1.6 Switch Connectivity Object Table 128 \u2013 Switch Connectivity Object Format <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | 7.1.7 IP Management List Object Table 129 \u2013 Port Connectivity Entry Format <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | Table 130 \u2013 IP Management List Object Format Table 131 \u2013 IP Management Entry Format <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | Table 132 \u2013 Basic IP Management Attributes Format Table 133 \u2013 IP Management Flags Table 134 \u2013 Well Known Protocols Access Specifier Format Table 135 \u2013 WKP Access Descriptor Format <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | Table 136 \u2013 WKP Access Flags <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | 7.1.8 Attribute Object Table 137 \u2013 Examples of Well Known Protocols Access Specifiers <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | Table 138 \u2013 Attribute Object Format Table 139 \u2013 Attribute Entry Format Table 140 \u2013 Attribute Formats <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 7.2 Policies Enforcement 7.2.1 Overview 7.2.2 Switch-to-Switch Connections Table 141 \u2013 Notation for Policy Enforcement <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 7.2.3 Switch-to-Node Connections <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 7.2.4 In-Band Management Access to a Switch <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 7.2.5 IP Management Access to a Switch <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 7.2.6 Direct Management Access to a Switch <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 7.2.7 Authentication Enforcement 7.3 Policies Management 7.3.1 Management Interface <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | Figure 27 \u2013 Policy Management Model Table 142 \u2013 Security Policy Server \u2013 Request Command Codes (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 7.3.2 Fabric Distribution Table 142 \u2013 Security Policy Server \u2013 Request Command Codes (part 2 of 2) Table 143 \u2013 ESFC Operations for Fabric Policies Table 144 \u2013 ESFC Payload for Operation \u2018Activate Policy Summary\u2019 <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | Table 145 \u2013 ESFC Payload for Operation \u2018Deactivate Policy Summary\u2019 Table 146 \u2013 ESFC Payload for Operation \u2018Add Policy Object\u2019 <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | Table 147 \u2013 ESFC Payload for Operation \u2018Remove Policy Object\u2019 Table 148 \u2013 ESFC Payload for Operation \u2018Remove All Non-Active Policy Objects\u2019 <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | 7.3.3 Relationship between Security Policy Server Requests and Fabric Actions 7.3.4 Policy Objects Support Table 149 \u2013 Security Policy Server CT Requests and Fabric Actions <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | Table 150 \u2013 GPOS Request CT_IU Table 151 \u2013 Accept CT_IU to a GPOS Request <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | Table 152 \u2013 Fabric Policy Objects Support Flags Table 153 \u2013 Switch Policy Objects Support Entry Format <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Table 154 \u2013 Switch Policy Objects Support Flags Table 155 \u2013 ESS Security Policy Server Capability Object Format <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | 7.3.5 Optional Data Table 156 \u2013 Optional Data Field Format Table 157 \u2013 Security Object Format Table 158 \u2013 Security Object Tags <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 7.3.6 Detailed Management Specification Table 159 \u2013 Vendor Specific Security Object Payload Format Table 160 \u2013 GPS Request CT_IU Table 161 \u2013 Accept CT_IU to a GPS Request <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | Table 162 \u2013 APS Request CT_IU Table 163 \u2013 Accept CT_IU to an APS Request <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | Table 164 \u2013 DPS Request CT_IU Table 165 \u2013 Accept CT_IU to a DPS Request Table 166 \u2013 GPO Request CT_IU <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | Table 167 \u2013 Accept CT_IU to a GPO Request Table 168 \u2013 GALN Request CT_IU <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | Table 169 \u2013 Accept CT_IU to a GALN Request Table 170 \u2013 GAAO Request CT_IU <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | Table 171 \u2013 Accept CT_IU to a GAAO Request Table 172 \u2013 APO Request CT_IU <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | Table 173 \u2013 Accept CT_IU to an APO Request Table 174 \u2013 RPO Request CT_IU <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | Table 175 \u2013 Accept CT_IU to a RPO Request Table 176 \u2013 RANA Request CT_IU <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 7.4 Policies Check 7.4.1 Overview 7.4.2 CPS Request Sequence Table 177 \u2013 Accept CT_IU to a RANA Request Table 178 \u2013 Check Policy Summary SW_ILS Request Payload <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | 7.4.3 CPS Reply Sequence 7.5 Policy Summation ELSs 7.5.1 Overview 7.5.2 Fabric Change Notification Specification Table 179 \u2013 Check Policy Summary SW_RJT Reasons Table 180 \u2013 Check Policy Summary SW_ACC Payload <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 7.6 Zoning Policies 7.6.1 Overview 7.6.2 Management Requests <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | Table 181 \u2013 Fabric Enhanced Zoning Support Flags Additions Table 183 \u2013 Fabric Enhanced Zoning Request Flags Additions <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | Table 184 \u2013 SPCMIT Request Payload <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | 7.6.3 Fabric Operations Table 185 \u2013 SPCMIT Accept Payload Table 186 \u2013 ESS Zone Server Support Flags Additions <\/td>\n<\/tr>\n | ||||||
201<\/td>\n | Table 187 \u2013 Zoning Check Protocol SW_ILS Request Payload Table 188 \u2013 Zoning Check Protocol SW_RJT Reasons <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | Table 189 \u2013 Zoning Check Protocol SW_ACC Payload Table 190 \u2013 Additional SFC Operation Request Codes <\/td>\n<\/tr>\n | ||||||
203<\/td>\n | Table 191 \u2013 Payload for the Operation Request \u2018FC-SP Activate Zone Set Enhanced\u2019 <\/td>\n<\/tr>\n | ||||||
204<\/td>\n | Table 192 \u2013 Payload for the Operation Request \u2018FC-SP Deactivate Zone Set Enhanced\u2019 Table 193 \u2013 Payload for the Operation Request \u2018FC-SP Distribute Zone Set Database\u2019 <\/td>\n<\/tr>\n | ||||||
205<\/td>\n | Table 194 \u2013 Payload for the Operation Request \u2018FC-SP Activate Zone Set by Name\u2019 Table 195 \u2013 Payload for the Operation Request \u2018FC-SP Set Zoning Policies\u2019 <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | 7.6.4 Zoning Ordering Rules <\/td>\n<\/tr>\n | ||||||
207<\/td>\n | 7.6.5 The Client-Server Protocol <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | Table 196 \u2013 Zone Information Request SW_ILS Request Payload <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | Table 197 \u2013 Zone Information Request SW_RJT Reasons Table 198 \u2013 Zone Information Request SW_ACC Payload <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | 8 Combinations of Security Protocols 8.1 Entity Authentication Overview 8.2 Terminology <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | 8.3 Scope of Security Relationships 8.3.1 N_Port_ID Virtualization 8.3.2 Nx_Port Entity to a Fabric Entity Figure 28 \u2013 Entity Authentication Standard Perspective <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | 8.3.3 Nx_Port Entity to Nx_Port Entity 8.4 Entity Authentication Model <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | Figure 29 \u2013 Entity Authentication Model for an Nx_Port (Informative) <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | 8.5 Abstract Services for Entity Authentication 8.5.1 Overview 8.5.2 Authentication Service <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | 8.5.3 Security Service 8.5.4 FC-2 Service <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | 8.6 Nx_Port to Fabric Authentication (NFA) State Machine 8.6.1 Overview <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | 8.6.2 NFA States Figure 30 \u2013 NFA State Machine <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | 8.6.3 NFA Events 8.6.4 NFA Transitions <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | 8.7 Fabric from Nx_Port Authentication (FNA) State Machine 8.7.1 Overview <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | 8.7.2 FNA States Figure 31 \u2013 FNA State Machine <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | 8.7.3 FNA Events 8.7.4 FNA Transitions <\/td>\n<\/tr>\n | ||||||
238<\/td>\n | 8.8 Nx_Port to Nx_Port Authentication (NNA) State Machine 8.8.1 Overview <\/td>\n<\/tr>\n | ||||||
239<\/td>\n | 8.8.2 NNA States Figure 32 \u2013 NNA State Machine <\/td>\n<\/tr>\n | ||||||
240<\/td>\n | 8.8.3 NNA Events 8.8.4 NNA Transitions <\/td>\n<\/tr>\n | ||||||
247<\/td>\n | 8.9 Additional Security State Machines 8.9.1 E_Port to E_Port Security Checks Figure 33 \u2013 State P17:Security Checks <\/td>\n<\/tr>\n | ||||||
248<\/td>\n | 8.9.2 B_Port Security Checks 8.9.3 Switch Security Checks with Virtual Fabrics <\/td>\n<\/tr>\n | ||||||
249<\/td>\n | Figure 34 \u2013 State P24(k):Security Checks <\/td>\n<\/tr>\n | ||||||
250<\/td>\n | 8.9.4 N_Port Security Checks with Virtual Fabrics 8.10 Impact on Other Standards <\/td>\n<\/tr>\n | ||||||
251<\/td>\n | Annex A: FC-SP-2 Compliance Summary (normative) A.1 Compliance Elements A.1.1 Overview Table A.1 \u2013 FC-SP-2 Authentication Compliance Elements Table A.2 \u2013 FC-SP-2 SA Management Compliance Elements Table A.3 \u2013 FC-SP-2 Policy Compliance Elements <\/td>\n<\/tr>\n | ||||||
252<\/td>\n | A.1.2 FC-SP-2 Compliance A.1.3 Conventions Table A.4 \u2013 Feature Set table terms and definitions Table A.5 \u2013 Feature Set table key abbreviations <\/td>\n<\/tr>\n | ||||||
253<\/td>\n | A.2 Authentication Compliance Elements A.2.1 AUTH-A Table A.6 \u2013 Authentication Protocols Support for AUTH-A Table A.7 \u2013 AUTH Messages Support for AUTH-A Table A.8 \u2013 Hash Functions Support for AUTH-A Table A.9 \u2013 DH Groups Support for AUTH-A <\/td>\n<\/tr>\n | ||||||
254<\/td>\n | A.2.2 AUTH-B1 Table A.10 \u2013 Authentication Protocols Support for AUTH-B1 Table A.11 \u2013 AUTH Messages Support for AUTH-B1 Table A.12 \u2013 Hash Functions Support for AUTH-B1 Table A.13 \u2013 DH Groups Support for AUTH-B1 <\/td>\n<\/tr>\n | ||||||
255<\/td>\n | A.2.3 AUTH-B2 Table A.14 \u2013 Authentication Protocols Support for AUTH-B2 Table A.15 \u2013 AUTH Messages Support for AUTH-B2 Table A.16 \u2013 Hash Functions Support for AUTH-B2 Table A.17 \u2013 DH Groups Support for AUTH-B2 <\/td>\n<\/tr>\n | ||||||
256<\/td>\n | A.2.4 AUTH-B3 Table A.18 \u2013 Authentication Protocols Support for AUTH-B3 Table A.19 \u2013 AUTH Messages Support for AUTH-B3 Table A.20 \u2013 Hash Functions Support for AUTH-B3 Table A.21 \u2013 DH Groups Support for AUTH-B3 <\/td>\n<\/tr>\n | ||||||
257<\/td>\n | A.3 SA Management Compliance Elements A.3.1 Algorithms Support Table A.22 \u2013 Security Protocols Support Table A.23 \u2013 Encryption Algorithms Support Table A.24 \u2013 Pseudo Random Functions Support <\/td>\n<\/tr>\n | ||||||
258<\/td>\n | Table A.25 \u2013 Integrity Algorithms Support Table A.26 \u2013 SA Management DH Groups Support <\/td>\n<\/tr>\n | ||||||
259<\/td>\n | A.3.2 SA-A Table A.27 \u2013 SA Management Protocol Support for SA-A Table A.28 \u2013 AUTH Messages Support for SA-A Table A.29 \u2013 IKEv2 Payloads Support for SA-A <\/td>\n<\/tr>\n | ||||||
260<\/td>\n | A.3.3 SA-B Table A.29 \u2013 IKEv2 Payloads Support for SA-A Table A.30 \u2013 SA Management Protocol Support for SA-B <\/td>\n<\/tr>\n | ||||||
261<\/td>\n | Table A.31 \u2013 AUTH Messages Support for SA-B Table A.32 \u2013 Authentication Hash Functions Support for SA-B Table A.33 \u2013 Authentication DH Groups Support for SA-B Table A.34 \u2013 IKEv2 Payloads Support for SA-B (part 1 of 2) <\/td>\n<\/tr>\n | ||||||
262<\/td>\n | Table A.34 \u2013 IKEv2 Payloads Support for SA-B (part 2 of 2) <\/td>\n<\/tr>\n | ||||||
263<\/td>\n | A.3.4 SA-C1 Table A.35 \u2013 SA Management Protocol Support for SA-C1 Table A.36 \u2013 AUTH Messages Support for SA-C1 Table A.37 \u2013 Authentication Hash Functions Support for SA-C1 <\/td>\n<\/tr>\n | ||||||
264<\/td>\n | Table A.38 \u2013 Authentication DH Groups Support for SA-C1 Table A.39 \u2013 IKEv2 Payloads Support for SA-C1 <\/td>\n<\/tr>\n | ||||||
265<\/td>\n | A.3.5 SA-C2 Table A.40 \u2013 SA Management Protocol Support for SA-C2 Table A.41 \u2013 AUTH Messages Support for SA-C2 Table A.42 \u2013 Authentication Hash Functions Support for SA-C2 <\/td>\n<\/tr>\n | ||||||
266<\/td>\n | Table A.43 \u2013 Authentication DH Groups Support for SA-C2 Table A.44 \u2013 IKEv2 Payloads Support for SA-C2 <\/td>\n<\/tr>\n | ||||||
267<\/td>\n | A.3.6 SA-C3 Table A.45 \u2013 SA Management Protocol Support for SA-C3 Table A.46 \u2013 AUTH Messages Support for SA-C3 Table A.47 \u2013 Authentication Hash Functions Support for SA-C3 <\/td>\n<\/tr>\n | ||||||
268<\/td>\n | Table A.48 \u2013 Authentication DH Groups Support for SA-C3 Table A.49 \u2013 IKEv2 Payloads Support for SA-C3 <\/td>\n<\/tr>\n | ||||||
269<\/td>\n | A.4 Policy Compliance Elements A.4.1 POL-A1 Table A.50 \u2013 Protocols Support for POL-A1 Table A.51 \u2013 Policy Objects Support for POL-A1 Table A.52 \u2013 Switch Flags Support for POL-A1 <\/td>\n<\/tr>\n | ||||||
270<\/td>\n | A.4.2 POL-A2 Table A.53 \u2013 Security Policy Server Support for POL-A1 Table A.54 \u2013 EUFC Operations Support for POL-A1 Table A.55 \u2013 Protocols Support for POL-A2 <\/td>\n<\/tr>\n | ||||||
271<\/td>\n | A.4.3 POL-A3 Table A.56 \u2013 Policy Objects Support for POL-A2 Table A.57 \u2013 Security Policy Server Support for POL-A2 Table A.58 \u2013 EUFC Operations Support for POL-A2 Table A.59 \u2013 Protocols Support for POL-A3 <\/td>\n<\/tr>\n | ||||||
272<\/td>\n | A.4.4 POL-B3 Table A.60 \u2013 Protocols Support for POL-B3 Table A.61 \u2013 Policy Objects Support for POL-B3 Table A.62 \u2013 Switch Flags Support for POL-B3 <\/td>\n<\/tr>\n | ||||||
273<\/td>\n | Table A.63 \u2013 Security Policy Server Support for POL-B3 Table A.64 \u2013 EUFC Operations Support for POL-B3 <\/td>\n<\/tr>\n | ||||||
274<\/td>\n | Annex B: KMIP Profile for FC-SP-2 EAP-GPSK (Normative) B.1 Overview B.2 General B.3 KMIP profile specification B.3.1 FC-SP-2 EAP-GPSK Profile B.3.2 FC-SP-2 EAP-GPSK Authentication Suite B.3.2.1 Protocol <\/td>\n<\/tr>\n | ||||||
275<\/td>\n | B.3.2.2 Client Authenticity B.3.2.3 Client Identity B.3.2.4 Object Creator B.3.2.5 Access Policy <\/td>\n<\/tr>\n | ||||||
276<\/td>\n | B.3.3 FC-SP-2 EAP\/GPSK Key Foundry and Server Conformance Clause <\/td>\n<\/tr>\n | ||||||
278<\/td>\n | Annex C: Random Number Generation and Secret Storage (informative) C.1 Random Number Generator C.2 Secret Storage <\/td>\n<\/tr>\n | ||||||
279<\/td>\n | Annex D: RADIUS Deployment (informative) D.1 Overview D.2 RADIUS Servers D.2.1 Overview <\/td>\n<\/tr>\n | ||||||
280<\/td>\n | D.2.2 Digest Algorithm D.3 RADIUS Messages D.3.1 Message Types Table D.1 \u2013 RADIUS Message Format Table D.2 \u2013 RADIUS Message Codes <\/td>\n<\/tr>\n | ||||||
281<\/td>\n | D.3.2 Radius Attributes D.3.2.1 User-Name Table D.3 \u2013 User-Name Attribute <\/td>\n<\/tr>\n | ||||||
282<\/td>\n | Table D.4 \u2013 Binary to UTF-8 Transformation <\/td>\n<\/tr>\n | ||||||
283<\/td>\n | D.3.2.2 CHAP-Password D.3.2.3 CHAP-Challenge Table D.5 \u2013 CHAP-Password Attribute <\/td>\n<\/tr>\n | ||||||
284<\/td>\n | D.4 RADIUS Authentication D.4.1 RADIUS Authentication Method Table D.6 \u2013 CHAP-Challenge Attribute <\/td>\n<\/tr>\n | ||||||
285<\/td>\n | D.4.2 RADIUS Authentication with NULL DH algorithm Table D.7 \u2013 Mathematical Notation for RADIUS Authentication <\/td>\n<\/tr>\n | ||||||
286<\/td>\n | Figure D.1 \u2013 Unidirectional Authentication with RADIUS <\/td>\n<\/tr>\n | ||||||
287<\/td>\n | D.4.3 Bidirectional Authentication with RADIUS Figure D.2 \u2013 Bidirectional Authentication with RADIUS <\/td>\n<\/tr>\n | ||||||
288<\/td>\n | D.4.4 RADIUS Authentication with DH option <\/td>\n<\/tr>\n | ||||||
289<\/td>\n | Figure D.3 \u2013 DH-CHAP Authentication with RADIUS <\/td>\n<\/tr>\n | ||||||
290<\/td>\n | Annex E: Examples of Proposals Negotiation for the SA Management Protocol (informative) <\/td>\n<\/tr>\n | ||||||
291<\/td>\n | Annex F: Guidelines for Mapping Access Control Requirements to Fabric Policies (informative) <\/td>\n<\/tr>\n | ||||||
292<\/td>\n | Annex G: Pre FC-SP-2 Fabric Policy Implementations (informative) G.1 Overview G.2 Fabric Management Policy Set G.2.1 Fabric Management Policy Set Overview G.2.2 FMPS Hierarchy Model G.2.3 Policy Description <\/td>\n<\/tr>\n | ||||||
293<\/td>\n | G.2.4 Policy Distribution G.2.5 Signature, Version Stamp, and Timestamp <\/td>\n<\/tr>\n | ||||||
294<\/td>\n | G.2.6 FMPS Object Structure G.2.7 Fabric Initialization And Fabric Join Procedures G.2.7.1 Overview <\/td>\n<\/tr>\n | ||||||
295<\/td>\n | G.2.7.2 Protocol Requirements G.2.7.3 Fabric Initialization Process <\/td>\n<\/tr>\n | ||||||
296<\/td>\n | G.2.7.4 Fabric Join G.2.7.5 Full Database Distribution During Initialization and Joining Process G.2.7.6 Database Distribution Request from an administrator <\/td>\n<\/tr>\n | ||||||
297<\/td>\n | G.2.8 FMPS Payload Format G.2.8.1 General Download Request Format <\/td>\n<\/tr>\n | ||||||
298<\/td>\n | Table G.1 \u2013 Security Request Payload Table G.2 \u2013 Security Command Code <\/td>\n<\/tr>\n | ||||||
299<\/td>\n | G.2.8.2 Certificate Download Request Table G.3 \u2013 Version Stamp Format Table G.4 \u2013 Certificate Download Object <\/td>\n<\/tr>\n | ||||||
300<\/td>\n | G.2.8.3 Security Policy Download Request G.2.8.4 Security Policy Set Object Table G.5 \u2013 Security Policy Set Object <\/td>\n<\/tr>\n | ||||||
301<\/td>\n | G.2.8.5 Security Policy Object Table G.6 \u2013 Security Policy Object Table G.7 \u2013 Type Value <\/td>\n<\/tr>\n | ||||||
302<\/td>\n | G.2.8.6 Policy Member Object Table G.8 \u2013 Policy Type Value Table G.9 \u2013 Policy Member Object <\/td>\n<\/tr>\n | ||||||
303<\/td>\n | G.2.8.7 Zone Set Object Structure G.2.8.8 General Download Accept Format Table G.10 \u2013 Member Type Value Table G.11 \u2013 Download Accept Payload Format <\/td>\n<\/tr>\n | ||||||
304<\/td>\n | G.3 Fabric Binding G.3.1 Fabric Binding Overview Table G.12 \u2013 Request Response Code values Table G.13 \u2013 Request Reason Code values <\/td>\n<\/tr>\n | ||||||
305<\/td>\n | G.3.2 Joining Switches G.3.3 Managing User-Initiated Change Requests G.3.4 Fabric Binding Objects G.3.4.1 Fabric Binding Membership List Entry G.3.5 Fabric Binding Commands Table G.14 \u2013 Fabric Binding Membership List Entry <\/td>\n<\/tr>\n | ||||||
306<\/td>\n | G.3.6 Exchange Fabric Membership Data (EFMD) G.3.6.1 Overview G.3.6.2 EFMD Request Payload Table G.15 \u2013 Fabric Configuration Data Requests Table G.16 \u2013 EFMD Request Payload <\/td>\n<\/tr>\n | ||||||
307<\/td>\n | G.3.6.3 Fabric Membership Data Exchange Rules Table G.17 \u2013 Operation Field Values Table G.18 \u2013 Fabric Binding Operation Membership Data <\/td>\n<\/tr>\n | ||||||
308<\/td>\n | G.3.6.4 EFMD Accept Payload G.3.7 Exchange Security Attributes (ESA) G.3.7.1 Overview Table G.19 \u2013 EFMD Accept Payload Table G.20 \u2013 EFMD Reason Codes Additions <\/td>\n<\/tr>\n | ||||||
309<\/td>\n | G.3.7.2 ESA Request Payload G.3.7.3 Enforced Security Attribute Object G.3.7.4 Use of Enforced Security Attribute and Required Security Attribute Mask Table G.21 \u2013 ESA Request Payload <\/td>\n<\/tr>\n | ||||||
310<\/td>\n | G.3.7.5 Extended Security Attribute Object G.3.7.6 Use of Extended Security Attribute and Required Extended Security Attribute Mask G.3.7.7 ESA Accept Payload G.3.8 Query Security Attributes (QSA) Version 1 G.3.8.1 Overview Table G.22 \u2013 ESA Accept Payload <\/td>\n<\/tr>\n | ||||||
311<\/td>\n | G.3.8.2 QSA Version 1 Request Payload G.3.8.3 QSA Version 1 Accept Payload Table G.23 \u2013 QSA Request Payload <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Fibre channel – Security Protocols. 2 (FC-SP-2)<\/b><\/p>\n |