Hello,
I have been trying to understand how to configure SAN discovery, but it looks like there are some either limitations or bugs in that area. DCNM has this page: Inventory - Discovery - SAN Switches, where I can define how to discover the fabric. We have snmpv3 user defined on each MDS with sha nad aes-128. Also, we use tacacs for ssh authentication. The main idea is not to use md5 and v2 communities (requirements from the sec team). Now, what I observed:
1. If I define v2 community, discovery works, but it's forbidden by the sec team
2. If I define snmpv3 user (defined locally on MDS) with sha and eas, discovery works, but I can see failed ssh logins to mds with that user (ssh is authenticated from tacacs) - why dcnm connects with ssh if snmpv3 discovery worked?
3. If I define AAA user with with md5 option, discovery works, but I can still see tcp connections to dcnm on port 161 (snmp), and what is md5 used for if the user comes from tacacs (see p.4 below)?
4. If I define AAA user with with sha and aes option, discovery does NOT work (failed to discover fabic, unknown user or password), what's the difference between md5 and sha if the user comes from tacacs?
Option 2 seems to work and to be compliant with security, but why dcnm tries to connect with ssh with that username, filling the log on mds with failed attempts?
Any clue on how to properly configure disovery options here?
Cheers,
Krzysztof