Справочник Пользователя для Q-Logic 5800V

Скачать
Страница из 134
2–Planning
Security
59265-02  B
2-29
Security Example: Host Authentication
Consider the fabric shown in 
In this fabric, only Switch_2 and 
Adapter_2/APP_2 support security, where APP_2 is a host application. The 
objective is to secure the management server on Switch_2 from unauthorized 
access by an adapter or an associated host application.
Figure 2-11. Security Example: Management Server
                                                                                           
Device: Adapter_1/APP_1
Security: No
E_Port
F_Port
F_Port
FL_Port
Device: Adapter_2/APP_2
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Switch_1
Security: No
Device: Switch_3
Security: No