McDATA 4416 manual Fabric Security, Connection Security

Page 29

Fabric Security

Fabric Security

An effective security profile begins with a security policy that states the requirements. A threat analysis is needed to define the plan of action followed by an implementation that meets the security policy requirements. Internet portals, such as remote access and E-mail, usually present the greatest threats. Fabric security should also be considered in defining the security policy.

Most fabrics are located at a single site and are protected by physical security, such as key-code locked computer rooms. For these cases, security methods such as user passwords and zoning are satisfactory.

Fabric security is needed when security policy requirements are more demanding: for example, when fabrics span multiple locations and traditional physical protection is insufficient to protect the IT infrastructure. Another benefit of fabric security is that it creates a structure that helps prevent unintended changes to the fabric.

Fabric security consists of the following:

Connection Security

Device Security

User Account Security

Connection Security

Connection security provides an encrypted data path for switch management methods. The switch supports the Secure Shell (SSH) protocol for the command line interface and the Secure Socket Layer (SSL) protocol for management applications such as McDATA Embedded Web Server, McDATA Element Manager, and Common Information Module (CIM).

The SSL handshake process between the workstation and the switch involves the exchanging of certificates. These certificates contain the public and private keys that define the encryption. When the SSL service is enabled, a certificate is automatically created on the switch. The workstation validates the switch certificate by comparing the workstation date and time to the switch certificate creation date and time. For this reason, it is important to synchronize the workstation and switch with the same date, time, and time zone. The switch certificate is valid 24 hours before its creation date and 365 days after its creation date. If the certificate should become invalid, refer to the Create command in the McDATA 4416 Command Line Interface Guide for information about creating a certificate.

Consider your requirements for connection security: for the command line interface (SSH), management applications such as McDATA Embedded Web Server (SSL), or both. If SSL connection security is required, also consider using the Network Time Protocol (NTP) to synchronize workstations and switches.

Refer to System keyword of the Set Setup command in the McDATA 4416 Command Line Interface Guide for information about enabling the NTP client on the switch and configuring the NTP server.

Refer to the Set command in the McDATA 4416 Command Line Interface Guide for information about setting the time zone.

Planning

2-9

Image 29
Contents McDATA Fibre Channel Switch Module Installation Guide Record of Revisions and Updates Contents Appendix a Specifications Chapter InstallationChapter Troubleshooting Contents McDATA 4416 Fibre Channel Switch Module Installation Guide Figures Figures Viii Tables Tables Who Should Use this Manual How to Use this ManualPreface Related Documentation General Description McDATA 4416 Switch ModuleMaintenance Button Switch Module Controls and LEDsIdentifier LED Green System Fault LED Amber Input Power LED Switch Module LEDsInput Power LED Green System Fault LED Amber10 11 12 Fibre Channel PortsLogged-In LED Green External Port LEDsPort Logged-In LED Green Port Activity LED GreenPort Types TransceiversGreen RJ-45 Ethernet Port Ethernet PortActivity LED Switch Module Management Devices PlanningLimit Description Device AccessSoft Zones Access Control List Hard ZonesDistance PerformanceLatency BandwidthDomain ID, Principal Priority, and Domain ID Lock Multiple Chassis FabricsOptimizing Device Performance Switch Module Services McDATA 4416 Fibre Channel Switch Module Installation Guide Connection Security Fabric SecurityDevice Security User Account Security Fabric ManagementMcDATA 4416 Fibre Channel Switch Module Installation Guide Fabric Management Workstation InstallationSite Requirements Environmental Conditions Installing a SwitchInstall SFP Transceivers Module Slot Mount the Switch Module in the Server ChassisSwitch Module in I/O Indirect Ethernet Direct Ethernet RJ-45 Connection Connect the Management Workstation to the Switch ModuleStart McDATA Embedded Web Server or McDATA Element Manager Configure the Switch Module Cable Devices to the Switch Install FirmwareMcDATA 4416 Fibre Channel Switch Module Installation Guide McDATA 4416 Command Line Interface Guide Using the CLI to Install FirmwareMcDATA 4416 Fibre Channel Switch Module Installation Guide System Fault LED is Illuminated TroubleshootingInput Power LED Is Extinguished Logged-In LED Logged-In LED IndicationsEPort Isolation Troubleshooting Excessive Port Errors Recovering a Switch Module Maintenance Image Unpack Maintenance ExitMaintenance Reset User Accounts to Default Maintenance Reset Network ConfigMaintenance Copy Log Files Maintenance Remove Switch ConfigMcDATA 4416 Fibre Channel Switch Module Installation Guide Fabric Specifications SpecificationsLED indicators Maintainability SpecificationsElectrical Specifications Fabric Management SpecificationsDimensional Specifications Environmental Specifications Certification Description Regulatory CertificationsMcDATA 4416 Fibre Channel Switch Module Installation Guide Glossary Server Interface SwitchInformation Base Protocol Interference EMI Numerics IndexLED Reset 1-2,4-7services 2-7specifications A-1 McDATA 4416 Fibre Channel Switch Module Installation Guide