Q-Logic 64 Manuel D’Utilisation

Page de 244
3 – Planning
Fabric Security
59043-03 A
3-15
D
3.5.2.2
Security Example: Host Authentication
Consider the fabric shown in 
. In this fabric, only Switch_2 and 
HBA_2/APP_2 support security, where APP_2 is a host application. The objective 
is to secure the management server on Switch_2 from unauthorized access by an 
HBA or an associated host application.
Figure 3-4.  Security Example: Management Server
1.
Create a security set (Security_Set_2) on Switch_2.
Device: HBA_1/APP_1
Security: No
E_Port
F_Port
F_Port
FL_Port
Device: HBA_2/APP_2
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Switch_1
Security: No
Device: Switch_3
Security: No
Device: JBOD
Security: No