• TRONTRON is one of the largest blockchain-based operating systems in the world. TRON is an ambitious project dedicated to building the infrastructure for a truly decentralized Internet.

  •  Dell EMC Elect 2018 

    Unfortunately the Dell EMC Elect program has been canceled with the merger between dell and emc after 1 year.

    Read more

  • Demo Image Everything you need and nothing you don’t. EMC MOBILE is the essential tool for those of us who live EMC. Now your documentation library is available and in-sync online or off direct from the EMC Cloud


  • Mikes AppMikes.eu App listed in Top Free Business App Windows Store. This simple but very clear app shows all the new posts from this site. Available for Windows 8 and 10. Try it out!

  • Demo ImageWhy Advertise on Mikes.eu

    Mikes.eu traffic varies depending on the post. We have a VERY focused audience in the Virtualization, AI, Blockchain, Storage and Cloud Marketing space. We have been ranked in the top 5 of Favorite Independent Blogger and one of the most visited website.


LDAP configuration for Brocade Switches

Written by on . Posted in How to

LDAP provides user authentication and authorization using the Microsoft Active Directory service in conjunction with LDAP on the switch. There are two modes of operation in LDAP authentication, FIPS mode and non-FIPS mode. This section discusses LDAP authentication in non-FIPS mode


Create a User and Group in Microsoft Active Directory with no spaces. In my case I created the Groupname SANAdmins

Login with PuTTy in your switch SAN console. Default FOS v7.x= User: admin Password: password

Perform an aaaconfig  --show to check existing configuration.

An LDAP server can be configured in two ways. Via the web login on the switch or ssh console. Because we already loged in at the console we execute this through the console. Add the aaconfig ldap server name by entering the following command. When you are ready verify with aaaconfig  --show

aaaconfig --add XXX.XX.XXX.XXX -conf ldap -p 389 -d mikes.lan

Use the ldap --maprole ldap_role_name switch_role command to map an LDAP server role to one of the default roles available on the switch. When ready verify with ldapcfg  --show

ldapcfg --maprole SANAdmins admin

Enable LDAP authentication by entering the following command:

aaaconfig --authspec "ldap;local"

Finaly you can check settings trough your web interface and remember the login requires the following name convention: username@mikes.lan


More information about adding LDAP or RADIUS can be found in the Administrator Guide

Download Free Designs http://bigtheme.net/ Free Websites Templates