{"id":126893,"date":"2024-10-19T05:41:57","date_gmt":"2024-10-19T05:41:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-14165-4322022\/"},"modified":"2024-10-24T23:22:45","modified_gmt":"2024-10-24T23:22:45","slug":"bs-iso-iec-14165-4322022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-14165-4322022\/","title":{"rendered":"BS ISO\/IEC 14165-432:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nContents <\/td>\n<\/tr>\n
17<\/td>\nFOREWORD <\/td>\n<\/tr>\n
19<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
20<\/td>\n1 Scope <\/td>\n<\/tr>\n
21<\/td>\n2 Normative references <\/td>\n<\/tr>\n
25<\/td>\n3 Terms, definitions, symbols, abbreviated terms, and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n
32<\/td>\n3.2 Symbols and abbreviated terms <\/td>\n<\/tr>\n
33<\/td>\n3.3 Editorial conventions
Tables
Table 1 \u2013 ISO and American conventions <\/td>\n<\/tr>\n
34<\/td>\n3.4 Keywords <\/td>\n<\/tr>\n
35<\/td>\n3.5 T10 Vendor ID
3.6 Sorting <\/td>\n<\/tr>\n
36<\/td>\n3.7 Terminate communication <\/td>\n<\/tr>\n
37<\/td>\n3.8 State machine notation
3.9 Using numbers in hash functions and concatenation functions
Figures
Figure 1 \u2013 State machine example <\/td>\n<\/tr>\n
39<\/td>\n4 Structure and Concepts
4.1 Overview
4.2 FC-SP-2 Compliance
4.3 Fabric Security Architecture
4.4 Authentication Infrastructure <\/td>\n<\/tr>\n
40<\/td>\n4.5 Authentication
Figure 2 \u2013 Relationship between Authentication Protocols and Security Associations <\/td>\n<\/tr>\n
41<\/td>\n4.6 Security Associations
4.7 Cryptographic Integrity and Confidentiality
4.7.1 Overview <\/td>\n<\/tr>\n
42<\/td>\n4.7.2 ESP_Header Processing
Figure 3 \u2013 Logical Model for Integrity and Confidentiality Protection with ESP_Header <\/td>\n<\/tr>\n
43<\/td>\n4.7.3 CT_Authentication Processing <\/td>\n<\/tr>\n
44<\/td>\nFigure 4 \u2013 Logical Model for Integrity and Confidentiality Protection with CT_Authentication <\/td>\n<\/tr>\n
45<\/td>\n4.8 Authorization (Access Control)
4.8.1 Policy Definition
4.8.2 Policy Enforcement <\/td>\n<\/tr>\n
46<\/td>\n4.8.3 Policy Distribution
4.8.4 Policy Check
4.9 Name Format
Table 2 \u2013 Name Format <\/td>\n<\/tr>\n
47<\/td>\n5 Authentication Protocols
5.1 Overview
Figure 5 \u2013 A Generic Authentication Transaction <\/td>\n<\/tr>\n
48<\/td>\n5.2 Authentication Messages Structure
5.2.1 Overview <\/td>\n<\/tr>\n
49<\/td>\n5.2.2 SW_ILS Authentication Messages
Table 3 \u2013 AUTH_ILS Message Format
Table 4 \u2013 AUTH_ILS Flags <\/td>\n<\/tr>\n
50<\/td>\n5.2.3 ELS Authentication Messages
Table 5 \u2013 B_AUTH_ILS Message Format
Table 6 \u2013 AUTH_ELS Message Format
Table 7 \u2013 AUTH_ELS Flags <\/td>\n<\/tr>\n
51<\/td>\n5.2.4 Fields Common to All AUTH Messages
Table 8 \u2013 AUTH Message Codes <\/td>\n<\/tr>\n
52<\/td>\n5.2.5 Vendor Specific Messages
5.3 Authentication Messages Common to Authentication Protocols
5.3.1 Overview
Table 9 \u2013 Vendor Specific Message Payload Format <\/td>\n<\/tr>\n
53<\/td>\n5.3.2 AUTH_Negotiate Message
Table 10 \u2013 AUTH_Negotiate Message Payload <\/td>\n<\/tr>\n
54<\/td>\n5.3.3 Names used in Authentication
Table 11 \u2013 Authentication Protocol Identifiers
Table 12 \u2013 AUTH_Negotiate Vendor Specific Protocol Parameters
Table 13 \u2013 Names used in Authentication <\/td>\n<\/tr>\n
55<\/td>\n5.3.4 Hash Functions
5.3.5 Diffie-Hellman Groups
Table 14 \u2013 Hash Functions Identifiers
Table 15 \u2013 Diffie-Hellman Group Identifiers (part 1 of 2) <\/td>\n<\/tr>\n
56<\/td>\n5.3.6 Accepting an AUTH_Negotiate Message
5.3.7 AUTH_Reject Message
Table 15 \u2013 Diffie-Hellman Group Identifiers (part 2 of 2) <\/td>\n<\/tr>\n
57<\/td>\nFigure 6 \u2013 Example of AUTH_Reject
Table 16 \u2013 AUTH_Reject Message Payload
Table 17 \u2013 AUTH_Reject Reason Codes <\/td>\n<\/tr>\n
58<\/td>\nTable 18 \u2013 AUTH_Reject Reason Code Explanations
Table 19 \u2013 Error Conditions (part 1 of 2) <\/td>\n<\/tr>\n
59<\/td>\n5.3.8 AUTH_Done Message
Table 19 \u2013 Error Conditions (part 2 of 2) <\/td>\n<\/tr>\n
60<\/td>\n5.4 DH-CHAP Protocol
5.4.1 Protocol Operations
Figure 7 \u2013 A DH-CHAP Protocol Transaction Example <\/td>\n<\/tr>\n
61<\/td>\nTable 20 \u2013 Mathematical Notation for DH-CHAP <\/td>\n<\/tr>\n
62<\/td>\n5.4.2 AUTH_Negotiate DH-CHAP Parameters
Table 21 \u2013 AUTH_Negotiate DH-CHAP Protocol Parameters
Table 22 \u2013 AUTH_Negotiate DH-CHAP Parameter Format
Table 23 \u2013 AUTH_Negotiate DH-CHAP Parameter Tags <\/td>\n<\/tr>\n
63<\/td>\n5.4.3 DHCHAP_Challenge Message
Table 24 \u2013 DHCHAP_Challenge Message Payload <\/td>\n<\/tr>\n
64<\/td>\n5.4.4 DHCHAP_Reply Message <\/td>\n<\/tr>\n
65<\/td>\nTable 25 \u2013 DHCHAP_Reply Message Payload <\/td>\n<\/tr>\n
66<\/td>\n5.4.5 DHCHAP_Success Message
Table 26 \u2013 DHCHAP_Success Message Payload <\/td>\n<\/tr>\n
67<\/td>\n5.4.6 Key Generation for the Security Association Management Protocol
5.4.7 Reuse of Diffie-Hellman Exponential
5.4.8 DH-CHAP Security Considerations <\/td>\n<\/tr>\n
69<\/td>\n5.5 FCAP Protocol
5.5.1 Protocol Operations
Table 27 \u2013 Mathematical Notation for FCAP <\/td>\n<\/tr>\n
70<\/td>\nFigure 8 \u2013 A FCAP Protocol Transaction Example <\/td>\n<\/tr>\n
72<\/td>\n5.5.2 AUTH_Negotiate FCAP Parameters
Table 28 \u2013 AUTH_Negotiate FCAP Protocol Parameters
Table 29 \u2013 AUTH_Negotiate FCAP Parameter Format
Table 30 \u2013 AUTH_Negotiate FCAP Parameter Tags <\/td>\n<\/tr>\n
73<\/td>\n5.5.3 FCAP_Request Message
Table 31 \u2013 FCAP_Request Message Payload <\/td>\n<\/tr>\n
74<\/td>\nTable 32 \u2013 FCAP Certificate Format
Table 33 \u2013 Certificate Formats
Table 34 \u2013 FCAP usage of X.509v3 Certificate fields (part 1 of 2) <\/td>\n<\/tr>\n
75<\/td>\nTable 34 \u2013 FCAP usage of X.509v3 Certificate fields (part 2 of 2) <\/td>\n<\/tr>\n
76<\/td>\n5.5.4 FCAP_Acknowledge Message
Table 35 \u2013 FCAP Nonce Format
Table 36 \u2013 Nonce Formats
Table 37 \u2013 FCAP_Acknowledge Message Payload <\/td>\n<\/tr>\n
77<\/td>\nTable 38 \u2013 FCAP Signature Format
Table 39 \u2013 Signature Formats <\/td>\n<\/tr>\n
78<\/td>\n5.5.5 FCAP_Confirm Message
5.5.6 Key Generation for the Security Association Management Protocol
Table 40 \u2013 FCAP_Confirm Message Payload <\/td>\n<\/tr>\n
79<\/td>\n5.5.7 Reuse of Diffie-Hellman Exponential <\/td>\n<\/tr>\n
80<\/td>\n5.6 FCPAP Protocol
5.6.1 Protocol Operations
Table 41 \u2013 Mathematical Notation for FCPAP <\/td>\n<\/tr>\n
81<\/td>\nFigure 9 \u2013 A FCPAP Protocol Transaction Example <\/td>\n<\/tr>\n
83<\/td>\n5.6.2 AUTH_Negotiate FCPAP Parameters
Table 42 \u2013 AUTH_Negotiate FCPAP Protocol Parameters
Table 43 \u2013 AUTH_Negotiate FCPAP Parameter Format
Table 44 \u2013 AUTH_Negotiate FCPAP Parameter Tags <\/td>\n<\/tr>\n
84<\/td>\n5.6.3 FCPAP_Init Message
Table 45 \u2013 FCPAP_Init Message Payload <\/td>\n<\/tr>\n
85<\/td>\n5.6.4 FCPAP_Accept Message
5.6.5 FCPAP_Complete Message
Table 46 \u2013 FCPAP_Accept Message Payload
Table 47 \u2013 FCPAP_Complete Message Payload <\/td>\n<\/tr>\n
86<\/td>\n5.6.6 Key Generation for the Security Association Management Protocol
5.6.7 Reuse of Diffie-Hellman Exponential <\/td>\n<\/tr>\n
87<\/td>\n5.7 FCEAP Protocol
5.7.1 Protocol Operations
5.7.2 AUTH_Negotiate FCEAP Parameters
Figure 10 \u2013 A FCEAP Protocol Transaction Example <\/td>\n<\/tr>\n
88<\/td>\n5.7.3 FCEAP_Request Message
5.7.4 FCEAP_Response Message
Table 48 \u2013 FCEAP_Request Message Payload
Table 49 \u2013 FCEAP_Response Message Payload <\/td>\n<\/tr>\n
89<\/td>\n5.7.5 FCEAP_Success Message
5.7.6 FCEAP_Failure Message
Table 50 \u2013 FCEAP_Success Message Payload
Table 51 \u2013 FCEAP_Failure Message Payload <\/td>\n<\/tr>\n
90<\/td>\n5.7.7 AUTH_Reject Use
5.7.8 AUTH_ELS and AUTH_ILS Size Requirements
Figure 11 \u2013 A Failing FCEAP Protocol Transaction Example <\/td>\n<\/tr>\n
91<\/td>\n5.7.9 Supported EAP Methods
5.7.10 Key Generation for the Security Association Management Protocol
Table 52 \u2013 Supported EAP Methods <\/td>\n<\/tr>\n
92<\/td>\n5.8 AUTH_ILS Specification
5.8.1 Overview <\/td>\n<\/tr>\n
93<\/td>\n5.8.2 AUTH_ILS Request Sequence
Figure 12 \u2013 FC-2 AUTH_ILS Mapping Example for the E_Port to E_Port Case <\/td>\n<\/tr>\n
94<\/td>\n5.8.3 AUTH_ILS Reply Sequence
5.9 B_AUTH_ILS Specification
5.9.1 Overview
Table 53 \u2013 AUTH_ILS SW_RJT Reasons
Table 54 \u2013 AUTH_ILS SW_ACC Payload <\/td>\n<\/tr>\n
95<\/td>\nFigure 13 \u2013 Usage of B_AUTH_ILS <\/td>\n<\/tr>\n
96<\/td>\n5.9.2 B_AUTH_ILS Request Sequence
Figure 14 \u2013 FC-2 B_AUTH_ILS Mapping Example <\/td>\n<\/tr>\n
97<\/td>\n5.9.3 B_AUTH_ILS Reply Sequence
5.10 AUTH_ELS Specification
5.10.1 Overview
Table 55 \u2013 B_AUTH_ILS SW_RJT Reasons
Table 56 \u2013 B_AUTH_ILS SW_ACC Payload <\/td>\n<\/tr>\n
99<\/td>\n5.10.2 AUTH_ELS Request Sequence
Figure 15 \u2013 FC-2 AUTH_ELS Mapping Example for the Nx_Port to Nx_Port Case <\/td>\n<\/tr>\n
100<\/td>\n5.10.3 AUTH_ELS Reply Sequence
5.10.4 AUTH_ELS Fragmentation
Table 57 \u2013 AUTH_ELS LS_RJT Reasons
Table 58 \u2013 AUTH_ELS LS_ACC Payload <\/td>\n<\/tr>\n
101<\/td>\nFigure 16 \u2013 AUTH_ELS Fragmentation Process <\/td>\n<\/tr>\n
102<\/td>\nFigure 17 \u2013 Use of the Sequence Number Bit Example <\/td>\n<\/tr>\n
103<\/td>\nFigure 18 \u2013 FC-2 Authentication Mapping with AUTH_ELS Fragmentation Example <\/td>\n<\/tr>\n
104<\/td>\n5.10.5 Authentication and Login
Table 59 \u2013 Security Bit Applicability
Table 60 \u2013 Security Bit usage with FLOGI <\/td>\n<\/tr>\n
105<\/td>\n5.11 Re-Authentication
Table 61 \u2013 Security Bit usage with PLOGI
Table 62 \u2013 Login LS_RJT Reasons <\/td>\n<\/tr>\n
106<\/td>\n5.12 Timeouts <\/td>\n<\/tr>\n
107<\/td>\n6 Security Association Management Protocol
6.1 Overview
6.1.1 General
Figure 19 \u2013 An SA Management Transaction Example <\/td>\n<\/tr>\n
108<\/td>\nTable 63 \u2013 IKE Payloads Summary <\/td>\n<\/tr>\n
109<\/td>\n6.1.2 IKE_SA_Init Overview
6.1.3 IKE_Auth Overview <\/td>\n<\/tr>\n
110<\/td>\n6.1.4 IKE_Create_Child_SA Overview
6.2 SA Management Messages
6.2.1 General Structure <\/td>\n<\/tr>\n
111<\/td>\n6.2.2 IKE_Header Payload
Table 64 \u2013 IKE_Header Payload Format <\/td>\n<\/tr>\n
112<\/td>\n6.2.3 Chaining Header
Table 65 \u2013 IKE Flags
Table 66 \u2013 Chaining Header Format <\/td>\n<\/tr>\n
113<\/td>\nTable 67 \u2013 IKE Payload Type Values <\/td>\n<\/tr>\n
114<\/td>\n6.2.4 AUTH_Reject Message Use
6.3 IKE_SA_Init Message
6.3.1 Overview
Table 68 \u2013 Chaining Flags <\/td>\n<\/tr>\n
115<\/td>\n6.3.2 Security_Association Payload
Figure 20 \u2013 An IKE_SA_Init exchange
Table 69 \u2013 IKE_SA_Init Message Payload <\/td>\n<\/tr>\n
117<\/td>\nTable 70 \u2013 Examples of Proposals <\/td>\n<\/tr>\n
118<\/td>\nTable 71 \u2013 Security_Association Payload Format <\/td>\n<\/tr>\n
119<\/td>\nTable 72 \u2013 Security Protocol Identifiers
Table 73 \u2013 Transforms Definition <\/td>\n<\/tr>\n
120<\/td>\nTable 74 \u2013 Transform Type Values <\/td>\n<\/tr>\n
121<\/td>\nTable 75 \u2013 Encryption Algorithms Transform_IDs (Transform Type 1)
Table 76 \u2013 Pseudo-random Functions Transform_IDs (Transform Type 2) <\/td>\n<\/tr>\n
122<\/td>\nTable 77 \u2013 Integrity Algorithms Transform_IDs (Transform Type 3)
Table 78 \u2013 Diffie-Hellman Group Transform_IDs (Transform Type 4) <\/td>\n<\/tr>\n
123<\/td>\nTable 79 \u2013 Mandatory Transform Types
Table 80 \u2013 Mandatory and Recommended Transform_IDs (part 1 of 2) <\/td>\n<\/tr>\n
124<\/td>\nTable 80 \u2013 Mandatory and Recommended Transform_IDs (part 2 of 2) <\/td>\n<\/tr>\n
125<\/td>\nTable 81 \u2013 Transform Attributes Definition
Table 82 \u2013 Attribute Type Values <\/td>\n<\/tr>\n
126<\/td>\n6.3.3 Key_Exchange Payload
6.3.4 Nonce Payload
6.4 IKE_Auth Message
6.4.1 Overview
Table 83 \u2013 Key_Exchange Payload Format
Table 84 \u2013 Nonce Payload Format <\/td>\n<\/tr>\n
127<\/td>\nFigure 21 \u2013 An IKE_Auth exchange
Table 85 \u2013 IKE_Auth Message Payload <\/td>\n<\/tr>\n
128<\/td>\n6.4.2 Encrypted Payload
Table 86 \u2013 IKE Payloads Contained in the IKE_Auth Message
Table 87 \u2013 Encrypted Payload Format <\/td>\n<\/tr>\n
129<\/td>\n6.4.3 Identification Payload
Table 88 \u2013 Identification Payload Format
Table 89 \u2013 Type Identifiers <\/td>\n<\/tr>\n
130<\/td>\n6.4.4 Authentication Payload
6.4.5 Traffic Selector Payload
Table 90 \u2013 Authentication Payload Format
Table 91 \u2013 Authentication Methods
Table 92 \u2013 Traffic Selector Payload Format <\/td>\n<\/tr>\n
131<\/td>\nTable 93 \u2013 Traffic Selector Definition
Table 94 \u2013 TS Type Identifiers <\/td>\n<\/tr>\n
132<\/td>\n6.4.6 Certificate Payload
Table 95 \u2013 Certificate Payload Format <\/td>\n<\/tr>\n
133<\/td>\n6.4.7 Certificate Request Payload
Table 96 \u2013 Certificate Encodings <\/td>\n<\/tr>\n
134<\/td>\nTable 97 \u2013 Certificate Request Payload Format <\/td>\n<\/tr>\n
135<\/td>\n6.5 IKE_Create_Child_SA Message
Figure 22 \u2013 An IKE_Create_Child_SA exchange <\/td>\n<\/tr>\n
136<\/td>\n6.6 IKE_Informational Message
6.6.1 Overview
Table 98 \u2013 IKE_Create_Child_SA Message Payload
Table 99 \u2013 IKE Payloads Contained in the IKE_Create_Child_SA Message <\/td>\n<\/tr>\n
137<\/td>\nFigure 23 \u2013 An IKE_Informational exchange
Table 100 \u2013 IKE_Informational Message Payload <\/td>\n<\/tr>\n
138<\/td>\n6.6.2 Notify Payload
Table 101 \u2013 IKE Payloads Contained in the IKE_Informational Message
Table 102 \u2013 Notify Payload Format <\/td>\n<\/tr>\n
139<\/td>\nTable 103 \u2013 Notify Message Types – Errors (part 1 of 2) <\/td>\n<\/tr>\n
140<\/td>\nTable 103 \u2013 Notify Message Types – Errors (part 2 of 2) <\/td>\n<\/tr>\n
141<\/td>\n6.6.3 Delete Payload
Table 104 \u2013 Notify Message Types – Status <\/td>\n<\/tr>\n
142<\/td>\n6.6.4 Vendor_ID Payload
Table 105 \u2013 Delete Payload Format <\/td>\n<\/tr>\n
143<\/td>\n6.7 Interaction with the Authentication Protocols
6.7.1 Overview
6.7.2 Concatenation of Authentication and SA Management Transactions
Table 106 \u2013 Vendor_ID Payload Format <\/td>\n<\/tr>\n
145<\/td>\n6.7.3 SA Management Transaction as Authentication Transaction
Figure 24 \u2013 Concatenation of Authentication and SA Management Transactions <\/td>\n<\/tr>\n
146<\/td>\n6.8 IKEv2 Protocol Details
6.8.1 Use of Retransmission Timers
6.8.2 Use of Sequence Numbers for Message_IDs
Figure 25 \u2013 An IKEv2-AUTH Transaction <\/td>\n<\/tr>\n
147<\/td>\n6.8.3 Overlapping Requests
6.8.4 State Synchronization and Connection Timeouts
6.8.5 Cookies and Anti-Clogging Protection
6.8.6 Cryptographic Algorithms Negotiation
6.8.7 Rekeying
6.8.8 Traffic Selector Negotiation <\/td>\n<\/tr>\n
148<\/td>\n6.8.9 Nonces
6.8.10 Reuse of Diffie-Hellman Exponential
6.8.11 Generating Keying Material
6.8.12 Generating Keying Material for the IKE_SA
6.8.13 Authentication of the IKE_SA <\/td>\n<\/tr>\n
149<\/td>\n6.8.14 Generating Keying Material for Child_SAs
6.8.15 Rekeying IKE_SAs using the IKE_Create_Child_SA exchange
6.8.16 IKE_Informational Messages outside of an IKE_SA
6.8.17 Error Handling
6.8.18 Conformance Requirements <\/td>\n<\/tr>\n
150<\/td>\n6.8.19 Rekeying IKE_SAs when Refreshing Authentication <\/td>\n<\/tr>\n
151<\/td>\n7 Fabric Policies
7.1 Policies Definition
7.1.1 Overview
Figure 26 \u2013 Policy Data Structures <\/td>\n<\/tr>\n
152<\/td>\nTable 107 \u2013 Policy Objects <\/td>\n<\/tr>\n
153<\/td>\n7.1.2 Names used to define Policies
Table 108 \u2013 Names used to define Policies <\/td>\n<\/tr>\n
155<\/td>\n7.1.3 Policy Summary Object
Table 109 \u2013 Policy Summary Object Format
Table 110 \u2013 Object Flags <\/td>\n<\/tr>\n
156<\/td>\n7.1.4 Switch Membership List Object
Table 111 \u2013 Hash Field Format
Table 112 \u2013 Hash Formats <\/td>\n<\/tr>\n
157<\/td>\nTable 113 \u2013 Switch Membership List Object Format
Table 114 \u2013 Object Flags <\/td>\n<\/tr>\n
158<\/td>\nTable 115 \u2013 Switch Entry Field Format
Table 116 \u2013 Basic Switch Attributes Format
Table 117 \u2013 Switch Flags <\/td>\n<\/tr>\n
160<\/td>\nTable 118 \u2013 Policy Data Role
Table 119 \u2013 Authentication Behavior <\/td>\n<\/tr>\n
161<\/td>\n7.1.5 Node Membership List Object
Table 120 \u2013 Node Membership List Object Format <\/td>\n<\/tr>\n
162<\/td>\nTable 121 \u2013 Node Entry Field Format
Table 122 \u2013 Basic Node Attribute Format
Table 123 \u2013 Node Flags <\/td>\n<\/tr>\n
163<\/td>\nTable 124 \u2013 Common Transport Access Specifier Format
Table 125 \u2013 CT Access Descriptor Format
Table 126 \u2013 CT Access Flags <\/td>\n<\/tr>\n
164<\/td>\nTable 127 \u2013 Examples of Common Transport Access Specifiers <\/td>\n<\/tr>\n
165<\/td>\n7.1.6 Switch Connectivity Object
Table 128 \u2013 Switch Connectivity Object Format <\/td>\n<\/tr>\n
166<\/td>\n7.1.7 IP Management List Object
Table 129 \u2013 Port Connectivity Entry Format <\/td>\n<\/tr>\n
167<\/td>\nTable 130 \u2013 IP Management List Object Format
Table 131 \u2013 IP Management Entry Format <\/td>\n<\/tr>\n
168<\/td>\nTable 132 \u2013 Basic IP Management Attributes Format
Table 133 \u2013 IP Management Flags
Table 134 \u2013 Well Known Protocols Access Specifier Format
Table 135 \u2013 WKP Access Descriptor Format <\/td>\n<\/tr>\n
169<\/td>\nTable 136 \u2013 WKP Access Flags <\/td>\n<\/tr>\n
170<\/td>\n7.1.8 Attribute Object
Table 137 \u2013 Examples of Well Known Protocols Access Specifiers <\/td>\n<\/tr>\n
171<\/td>\nTable 138 \u2013 Attribute Object Format
Table 139 \u2013 Attribute Entry Format
Table 140 \u2013 Attribute Formats <\/td>\n<\/tr>\n
172<\/td>\n7.2 Policies Enforcement
7.2.1 Overview
7.2.2 Switch-to-Switch Connections
Table 141 \u2013 Notation for Policy Enforcement <\/td>\n<\/tr>\n
173<\/td>\n7.2.3 Switch-to-Node Connections <\/td>\n<\/tr>\n
174<\/td>\n7.2.4 In-Band Management Access to a Switch <\/td>\n<\/tr>\n
175<\/td>\n7.2.5 IP Management Access to a Switch <\/td>\n<\/tr>\n
176<\/td>\n7.2.6 Direct Management Access to a Switch <\/td>\n<\/tr>\n
177<\/td>\n7.2.7 Authentication Enforcement
7.3 Policies Management
7.3.1 Management Interface <\/td>\n<\/tr>\n
178<\/td>\nFigure 27 \u2013 Policy Management Model
Table 142 \u2013 Security Policy Server \u2013 Request Command Codes (part 1 of 2) <\/td>\n<\/tr>\n
179<\/td>\n7.3.2 Fabric Distribution
Table 142 \u2013 Security Policy Server \u2013 Request Command Codes (part 2 of 2)
Table 143 \u2013 ESFC Operations for Fabric Policies
Table 144 \u2013 ESFC Payload for Operation \u2018Activate Policy Summary\u2019 <\/td>\n<\/tr>\n
180<\/td>\nTable 145 \u2013 ESFC Payload for Operation \u2018Deactivate Policy Summary\u2019
Table 146 \u2013 ESFC Payload for Operation \u2018Add Policy Object\u2019 <\/td>\n<\/tr>\n
181<\/td>\nTable 147 \u2013 ESFC Payload for Operation \u2018Remove Policy Object\u2019
Table 148 \u2013 ESFC Payload for Operation \u2018Remove All Non-Active Policy Objects\u2019 <\/td>\n<\/tr>\n
182<\/td>\n7.3.3 Relationship between Security Policy Server Requests and Fabric Actions
7.3.4 Policy Objects Support
Table 149 \u2013 Security Policy Server CT Requests and Fabric Actions <\/td>\n<\/tr>\n
183<\/td>\nTable 150 \u2013 GPOS Request CT_IU
Table 151 \u2013 Accept CT_IU to a GPOS Request <\/td>\n<\/tr>\n
184<\/td>\nTable 152 \u2013 Fabric Policy Objects Support Flags
Table 153 \u2013 Switch Policy Objects Support Entry Format <\/td>\n<\/tr>\n
185<\/td>\nTable 154 \u2013 Switch Policy Objects Support Flags
Table 155 \u2013 ESS Security Policy Server Capability Object Format <\/td>\n<\/tr>\n
186<\/td>\n7.3.5 Optional Data
Table 156 \u2013 Optional Data Field Format
Table 157 \u2013 Security Object Format
Table 158 \u2013 Security Object Tags <\/td>\n<\/tr>\n
187<\/td>\n7.3.6 Detailed Management Specification
Table 159 \u2013 Vendor Specific Security Object Payload Format
Table 160 \u2013 GPS Request CT_IU
Table 161 \u2013 Accept CT_IU to a GPS Request <\/td>\n<\/tr>\n
188<\/td>\nTable 162 \u2013 APS Request CT_IU
Table 163 \u2013 Accept CT_IU to an APS Request <\/td>\n<\/tr>\n
189<\/td>\nTable 164 \u2013 DPS Request CT_IU
Table 165 \u2013 Accept CT_IU to a DPS Request
Table 166 \u2013 GPO Request CT_IU <\/td>\n<\/tr>\n
190<\/td>\nTable 167 \u2013 Accept CT_IU to a GPO Request
Table 168 \u2013 GALN Request CT_IU <\/td>\n<\/tr>\n
191<\/td>\nTable 169 \u2013 Accept CT_IU to a GALN Request
Table 170 \u2013 GAAO Request CT_IU <\/td>\n<\/tr>\n
192<\/td>\nTable 171 \u2013 Accept CT_IU to a GAAO Request
Table 172 \u2013 APO Request CT_IU <\/td>\n<\/tr>\n
193<\/td>\nTable 173 \u2013 Accept CT_IU to an APO Request
Table 174 \u2013 RPO Request CT_IU <\/td>\n<\/tr>\n
194<\/td>\nTable 175 \u2013 Accept CT_IU to a RPO Request
Table 176 \u2013 RANA Request CT_IU <\/td>\n<\/tr>\n
195<\/td>\n7.4 Policies Check
7.4.1 Overview
7.4.2 CPS Request Sequence
Table 177 \u2013 Accept CT_IU to a RANA Request
Table 178 \u2013 Check Policy Summary SW_ILS Request Payload <\/td>\n<\/tr>\n
196<\/td>\n7.4.3 CPS Reply Sequence
7.5 Policy Summation ELSs
7.5.1 Overview
7.5.2 Fabric Change Notification Specification
Table 179 \u2013 Check Policy Summary SW_RJT Reasons
Table 180 \u2013 Check Policy Summary SW_ACC Payload <\/td>\n<\/tr>\n
197<\/td>\n7.6 Zoning Policies
7.6.1 Overview
7.6.2 Management Requests <\/td>\n<\/tr>\n
198<\/td>\nTable 181 \u2013 Fabric Enhanced Zoning Support Flags Additions
Table 183 \u2013 Fabric Enhanced Zoning Request Flags Additions <\/td>\n<\/tr>\n
199<\/td>\nTable 184 \u2013 SPCMIT Request Payload <\/td>\n<\/tr>\n
200<\/td>\n7.6.3 Fabric Operations
Table 185 \u2013 SPCMIT Accept Payload
Table 186 \u2013 ESS Zone Server Support Flags Additions <\/td>\n<\/tr>\n
201<\/td>\nTable 187 \u2013 Zoning Check Protocol SW_ILS Request Payload
Table 188 \u2013 Zoning Check Protocol SW_RJT Reasons <\/td>\n<\/tr>\n
202<\/td>\nTable 189 \u2013 Zoning Check Protocol SW_ACC Payload
Table 190 \u2013 Additional SFC Operation Request Codes <\/td>\n<\/tr>\n
203<\/td>\nTable 191 \u2013 Payload for the Operation Request \u2018FC-SP Activate Zone Set Enhanced\u2019 <\/td>\n<\/tr>\n
204<\/td>\nTable 192 \u2013 Payload for the Operation Request \u2018FC-SP Deactivate Zone Set Enhanced\u2019
Table 193 \u2013 Payload for the Operation Request \u2018FC-SP Distribute Zone Set Database\u2019 <\/td>\n<\/tr>\n
205<\/td>\nTable 194 \u2013 Payload for the Operation Request \u2018FC-SP Activate Zone Set by Name\u2019
Table 195 \u2013 Payload for the Operation Request \u2018FC-SP Set Zoning Policies\u2019 <\/td>\n<\/tr>\n
206<\/td>\n7.6.4 Zoning Ordering Rules <\/td>\n<\/tr>\n
207<\/td>\n7.6.5 The Client-Server Protocol <\/td>\n<\/tr>\n
208<\/td>\nTable 196 \u2013 Zone Information Request SW_ILS Request Payload <\/td>\n<\/tr>\n
209<\/td>\nTable 197 \u2013 Zone Information Request SW_RJT Reasons
Table 198 \u2013 Zone Information Request SW_ACC Payload <\/td>\n<\/tr>\n
210<\/td>\n8 Combinations of Security Protocols
8.1 Entity Authentication Overview
8.2 Terminology <\/td>\n<\/tr>\n
211<\/td>\n8.3 Scope of Security Relationships
8.3.1 N_Port_ID Virtualization
8.3.2 Nx_Port Entity to a Fabric Entity
Figure 28 \u2013 Entity Authentication Standard Perspective <\/td>\n<\/tr>\n
212<\/td>\n8.3.3 Nx_Port Entity to Nx_Port Entity
8.4 Entity Authentication Model <\/td>\n<\/tr>\n
213<\/td>\nFigure 29 \u2013 Entity Authentication Model for an Nx_Port (Informative) <\/td>\n<\/tr>\n
214<\/td>\n8.5 Abstract Services for Entity Authentication
8.5.1 Overview
8.5.2 Authentication Service <\/td>\n<\/tr>\n
215<\/td>\n8.5.3 Security Service
8.5.4 FC-2 Service <\/td>\n<\/tr>\n
220<\/td>\n8.6 Nx_Port to Fabric Authentication (NFA) State Machine
8.6.1 Overview <\/td>\n<\/tr>\n
221<\/td>\n8.6.2 NFA States
Figure 30 \u2013 NFA State Machine <\/td>\n<\/tr>\n
222<\/td>\n8.6.3 NFA Events
8.6.4 NFA Transitions <\/td>\n<\/tr>\n
228<\/td>\n8.7 Fabric from Nx_Port Authentication (FNA) State Machine
8.7.1 Overview <\/td>\n<\/tr>\n
229<\/td>\n8.7.2 FNA States
Figure 31 \u2013 FNA State Machine <\/td>\n<\/tr>\n
230<\/td>\n8.7.3 FNA Events
8.7.4 FNA Transitions <\/td>\n<\/tr>\n
238<\/td>\n8.8 Nx_Port to Nx_Port Authentication (NNA) State Machine
8.8.1 Overview <\/td>\n<\/tr>\n
239<\/td>\n8.8.2 NNA States
Figure 32 \u2013 NNA State Machine <\/td>\n<\/tr>\n
240<\/td>\n8.8.3 NNA Events
8.8.4 NNA Transitions <\/td>\n<\/tr>\n
247<\/td>\n8.9 Additional Security State Machines
8.9.1 E_Port to E_Port Security Checks
Figure 33 \u2013 State P17:Security Checks <\/td>\n<\/tr>\n
248<\/td>\n8.9.2 B_Port Security Checks
8.9.3 Switch Security Checks with Virtual Fabrics <\/td>\n<\/tr>\n
249<\/td>\nFigure 34 \u2013 State P24(k):Security Checks <\/td>\n<\/tr>\n
250<\/td>\n8.9.4 N_Port Security Checks with Virtual Fabrics
8.10 Impact on Other Standards <\/td>\n<\/tr>\n
251<\/td>\nAnnex A: FC-SP-2 Compliance Summary (normative)
A.1 Compliance Elements
A.1.1 Overview
Table A.1 \u2013 FC-SP-2 Authentication Compliance Elements
Table A.2 \u2013 FC-SP-2 SA Management Compliance Elements
Table A.3 \u2013 FC-SP-2 Policy Compliance Elements <\/td>\n<\/tr>\n
252<\/td>\nA.1.2 FC-SP-2 Compliance
A.1.3 Conventions
Table A.4 \u2013 Feature Set table terms and definitions
Table A.5 \u2013 Feature Set table key abbreviations <\/td>\n<\/tr>\n
253<\/td>\nA.2 Authentication Compliance Elements
A.2.1 AUTH-A
Table A.6 \u2013 Authentication Protocols Support for AUTH-A
Table A.7 \u2013 AUTH Messages Support for AUTH-A
Table A.8 \u2013 Hash Functions Support for AUTH-A
Table A.9 \u2013 DH Groups Support for AUTH-A <\/td>\n<\/tr>\n
254<\/td>\nA.2.2 AUTH-B1
Table A.10 \u2013 Authentication Protocols Support for AUTH-B1
Table A.11 \u2013 AUTH Messages Support for AUTH-B1
Table A.12 \u2013 Hash Functions Support for AUTH-B1
Table A.13 \u2013 DH Groups Support for AUTH-B1 <\/td>\n<\/tr>\n
255<\/td>\nA.2.3 AUTH-B2
Table A.14 \u2013 Authentication Protocols Support for AUTH-B2
Table A.15 \u2013 AUTH Messages Support for AUTH-B2
Table A.16 \u2013 Hash Functions Support for AUTH-B2
Table A.17 \u2013 DH Groups Support for AUTH-B2 <\/td>\n<\/tr>\n
256<\/td>\nA.2.4 AUTH-B3
Table A.18 \u2013 Authentication Protocols Support for AUTH-B3
Table A.19 \u2013 AUTH Messages Support for AUTH-B3
Table A.20 \u2013 Hash Functions Support for AUTH-B3
Table A.21 \u2013 DH Groups Support for AUTH-B3 <\/td>\n<\/tr>\n
257<\/td>\nA.3 SA Management Compliance Elements
A.3.1 Algorithms Support
Table A.22 \u2013 Security Protocols Support
Table A.23 \u2013 Encryption Algorithms Support
Table A.24 \u2013 Pseudo Random Functions Support <\/td>\n<\/tr>\n
258<\/td>\nTable A.25 \u2013 Integrity Algorithms Support
Table A.26 \u2013 SA Management DH Groups Support <\/td>\n<\/tr>\n
259<\/td>\nA.3.2 SA-A
Table A.27 \u2013 SA Management Protocol Support for SA-A
Table A.28 \u2013 AUTH Messages Support for SA-A
Table A.29 \u2013 IKEv2 Payloads Support for SA-A <\/td>\n<\/tr>\n
260<\/td>\nA.3.3 SA-B
Table A.29 \u2013 IKEv2 Payloads Support for SA-A
Table A.30 \u2013 SA Management Protocol Support for SA-B <\/td>\n<\/tr>\n
261<\/td>\nTable A.31 \u2013 AUTH Messages Support for SA-B
Table A.32 \u2013 Authentication Hash Functions Support for SA-B
Table A.33 \u2013 Authentication DH Groups Support for SA-B
Table A.34 \u2013 IKEv2 Payloads Support for SA-B (part 1 of 2) <\/td>\n<\/tr>\n
262<\/td>\nTable A.34 \u2013 IKEv2 Payloads Support for SA-B (part 2 of 2) <\/td>\n<\/tr>\n
263<\/td>\nA.3.4 SA-C1
Table A.35 \u2013 SA Management Protocol Support for SA-C1
Table A.36 \u2013 AUTH Messages Support for SA-C1
Table A.37 \u2013 Authentication Hash Functions Support for SA-C1 <\/td>\n<\/tr>\n
264<\/td>\nTable A.38 \u2013 Authentication DH Groups Support for SA-C1
Table A.39 \u2013 IKEv2 Payloads Support for SA-C1 <\/td>\n<\/tr>\n
265<\/td>\nA.3.5 SA-C2
Table A.40 \u2013 SA Management Protocol Support for SA-C2
Table A.41 \u2013 AUTH Messages Support for SA-C2
Table A.42 \u2013 Authentication Hash Functions Support for SA-C2 <\/td>\n<\/tr>\n
266<\/td>\nTable A.43 \u2013 Authentication DH Groups Support for SA-C2
Table A.44 \u2013 IKEv2 Payloads Support for SA-C2 <\/td>\n<\/tr>\n
267<\/td>\nA.3.6 SA-C3
Table A.45 \u2013 SA Management Protocol Support for SA-C3
Table A.46 \u2013 AUTH Messages Support for SA-C3
Table A.47 \u2013 Authentication Hash Functions Support for SA-C3 <\/td>\n<\/tr>\n
268<\/td>\nTable A.48 \u2013 Authentication DH Groups Support for SA-C3
Table A.49 \u2013 IKEv2 Payloads Support for SA-C3 <\/td>\n<\/tr>\n
269<\/td>\nA.4 Policy Compliance Elements
A.4.1 POL-A1
Table A.50 \u2013 Protocols Support for POL-A1
Table A.51 \u2013 Policy Objects Support for POL-A1
Table A.52 \u2013 Switch Flags Support for POL-A1 <\/td>\n<\/tr>\n
270<\/td>\nA.4.2 POL-A2
Table A.53 \u2013 Security Policy Server Support for POL-A1
Table A.54 \u2013 EUFC Operations Support for POL-A1
Table A.55 \u2013 Protocols Support for POL-A2 <\/td>\n<\/tr>\n
271<\/td>\nA.4.3 POL-A3
Table A.56 \u2013 Policy Objects Support for POL-A2
Table A.57 \u2013 Security Policy Server Support for POL-A2
Table A.58 \u2013 EUFC Operations Support for POL-A2
Table A.59 \u2013 Protocols Support for POL-A3 <\/td>\n<\/tr>\n
272<\/td>\nA.4.4 POL-B3
Table A.60 \u2013 Protocols Support for POL-B3
Table A.61 \u2013 Policy Objects Support for POL-B3
Table A.62 \u2013 Switch Flags Support for POL-B3 <\/td>\n<\/tr>\n
273<\/td>\nTable A.63 \u2013 Security Policy Server Support for POL-B3
Table A.64 \u2013 EUFC Operations Support for POL-B3 <\/td>\n<\/tr>\n
274<\/td>\nAnnex B: KMIP Profile for FC-SP-2 EAP-GPSK (Normative)
B.1 Overview
B.2 General
B.3 KMIP profile specification
B.3.1 FC-SP-2 EAP-GPSK Profile
B.3.2 FC-SP-2 EAP-GPSK Authentication Suite
B.3.2.1 Protocol <\/td>\n<\/tr>\n
275<\/td>\nB.3.2.2 Client Authenticity
B.3.2.3 Client Identity
B.3.2.4 Object Creator
B.3.2.5 Access Policy <\/td>\n<\/tr>\n
276<\/td>\nB.3.3 FC-SP-2 EAP\/GPSK Key Foundry and Server Conformance Clause <\/td>\n<\/tr>\n
278<\/td>\nAnnex C: Random Number Generation and Secret Storage (informative)
C.1 Random Number Generator
C.2 Secret Storage <\/td>\n<\/tr>\n
279<\/td>\nAnnex D: RADIUS Deployment (informative)
D.1 Overview
D.2 RADIUS Servers
D.2.1 Overview <\/td>\n<\/tr>\n
280<\/td>\nD.2.2 Digest Algorithm
D.3 RADIUS Messages
D.3.1 Message Types
Table D.1 \u2013 RADIUS Message Format
Table D.2 \u2013 RADIUS Message Codes <\/td>\n<\/tr>\n
281<\/td>\nD.3.2 Radius Attributes
D.3.2.1 User-Name
Table D.3 \u2013 User-Name Attribute <\/td>\n<\/tr>\n
282<\/td>\nTable D.4 \u2013 Binary to UTF-8 Transformation <\/td>\n<\/tr>\n
283<\/td>\nD.3.2.2 CHAP-Password
D.3.2.3 CHAP-Challenge
Table D.5 \u2013 CHAP-Password Attribute <\/td>\n<\/tr>\n
284<\/td>\nD.4 RADIUS Authentication
D.4.1 RADIUS Authentication Method
Table D.6 \u2013 CHAP-Challenge Attribute <\/td>\n<\/tr>\n
285<\/td>\nD.4.2 RADIUS Authentication with NULL DH algorithm
Table D.7 \u2013 Mathematical Notation for RADIUS Authentication <\/td>\n<\/tr>\n
286<\/td>\nFigure D.1 \u2013 Unidirectional Authentication with RADIUS <\/td>\n<\/tr>\n
287<\/td>\nD.4.3 Bidirectional Authentication with RADIUS
Figure D.2 \u2013 Bidirectional Authentication with RADIUS <\/td>\n<\/tr>\n
288<\/td>\nD.4.4 RADIUS Authentication with DH option <\/td>\n<\/tr>\n
289<\/td>\nFigure D.3 \u2013 DH-CHAP Authentication with RADIUS <\/td>\n<\/tr>\n
290<\/td>\nAnnex E: Examples of Proposals Negotiation for the SA Management Protocol (informative) <\/td>\n<\/tr>\n
291<\/td>\nAnnex F: Guidelines for Mapping Access Control Requirements to Fabric Policies (informative) <\/td>\n<\/tr>\n
292<\/td>\nAnnex G: Pre FC-SP-2 Fabric Policy Implementations (informative)
G.1 Overview
G.2 Fabric Management Policy Set
G.2.1 Fabric Management Policy Set Overview
G.2.2 FMPS Hierarchy Model
G.2.3 Policy Description <\/td>\n<\/tr>\n
293<\/td>\nG.2.4 Policy Distribution
G.2.5 Signature, Version Stamp, and Timestamp <\/td>\n<\/tr>\n
294<\/td>\nG.2.6 FMPS Object Structure
G.2.7 Fabric Initialization And Fabric Join Procedures
G.2.7.1 Overview <\/td>\n<\/tr>\n
295<\/td>\nG.2.7.2 Protocol Requirements
G.2.7.3 Fabric Initialization Process <\/td>\n<\/tr>\n
296<\/td>\nG.2.7.4 Fabric Join
G.2.7.5 Full Database Distribution During Initialization and Joining Process
G.2.7.6 Database Distribution Request from an administrator <\/td>\n<\/tr>\n
297<\/td>\nG.2.8 FMPS Payload Format
G.2.8.1 General Download Request Format <\/td>\n<\/tr>\n
298<\/td>\nTable G.1 \u2013 Security Request Payload
Table G.2 \u2013 Security Command Code <\/td>\n<\/tr>\n
299<\/td>\nG.2.8.2 Certificate Download Request
Table G.3 \u2013 Version Stamp Format
Table G.4 \u2013 Certificate Download Object <\/td>\n<\/tr>\n
300<\/td>\nG.2.8.3 Security Policy Download Request
G.2.8.4 Security Policy Set Object
Table G.5 \u2013 Security Policy Set Object <\/td>\n<\/tr>\n
301<\/td>\nG.2.8.5 Security Policy Object
Table G.6 \u2013 Security Policy Object
Table G.7 \u2013 Type Value <\/td>\n<\/tr>\n
302<\/td>\nG.2.8.6 Policy Member Object
Table G.8 \u2013 Policy Type Value
Table G.9 \u2013 Policy Member Object <\/td>\n<\/tr>\n
303<\/td>\nG.2.8.7 Zone Set Object Structure
G.2.8.8 General Download Accept Format
Table G.10 \u2013 Member Type Value
Table G.11 \u2013 Download Accept Payload Format <\/td>\n<\/tr>\n
304<\/td>\nG.3 Fabric Binding
G.3.1 Fabric Binding Overview
Table G.12 \u2013 Request Response Code values
Table G.13 \u2013 Request Reason Code values <\/td>\n<\/tr>\n
305<\/td>\nG.3.2 Joining Switches
G.3.3 Managing User-Initiated Change Requests
G.3.4 Fabric Binding Objects
G.3.4.1 Fabric Binding Membership List Entry
G.3.5 Fabric Binding Commands
Table G.14 \u2013 Fabric Binding Membership List Entry <\/td>\n<\/tr>\n
306<\/td>\nG.3.6 Exchange Fabric Membership Data (EFMD)
G.3.6.1 Overview
G.3.6.2 EFMD Request Payload
Table G.15 \u2013 Fabric Configuration Data Requests
Table G.16 \u2013 EFMD Request Payload <\/td>\n<\/tr>\n
307<\/td>\nG.3.6.3 Fabric Membership Data Exchange Rules
Table G.17 \u2013 Operation Field Values
Table G.18 \u2013 Fabric Binding Operation Membership Data <\/td>\n<\/tr>\n
308<\/td>\nG.3.6.4 EFMD Accept Payload
G.3.7 Exchange Security Attributes (ESA)
G.3.7.1 Overview
Table G.19 \u2013 EFMD Accept Payload
Table G.20 \u2013 EFMD Reason Codes Additions <\/td>\n<\/tr>\n
309<\/td>\nG.3.7.2 ESA Request Payload
G.3.7.3 Enforced Security Attribute Object
G.3.7.4 Use of Enforced Security Attribute and Required Security Attribute Mask
Table G.21 \u2013 ESA Request Payload <\/td>\n<\/tr>\n
310<\/td>\nG.3.7.5 Extended Security Attribute Object
G.3.7.6 Use of Extended Security Attribute and Required Extended Security Attribute Mask
G.3.7.7 ESA Accept Payload
G.3.8 Query Security Attributes (QSA) Version 1
G.3.8.1 Overview
Table G.22 \u2013 ESA Accept Payload <\/td>\n<\/tr>\n
311<\/td>\nG.3.8.2 QSA Version 1 Request Payload
G.3.8.3 QSA Version 1 Accept Payload
Table G.23 \u2013 QSA Request Payload <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Fibre channel – Security Protocols. 2 (FC-SP-2)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n312<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":126894,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-126893","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/126893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/126894"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=126893"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=126893"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=126893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}