Q-Logic 5800V Manual Do Utilizador

Página de 134
2–Planning
Security
2-22
59265-02  B
Security Example: Switches and Adapters with Authentication
Consider the fabric shown in 
. In this fabric, Switch_1, Adapter_1, and 
Switch_2 support authentication, while the JBOD and Adapter_2 do not. The 
objective is to secure F_Ports and E_Ports in the fabric.
Figure 2-9. Security Example: Switches and Adapters
                                                                                           
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Adapter_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port
F_Port
FL_Port
Device: JBOD
WWNS:10:00:00:d1:ee:18:d4:5e
10:00:00:d1:ee:18:d4:5f
10:00:00:d1:ee:18:d4:5g
Security: No
Device: Adapter_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No