Policy monitor overview

36

Rule Violation Fix — If the policy monitor report shows a violation, enable SSH on the device. Disable Telnet settings on the device, if enabled.

Check for SNMPv3 (secure SNMP) configuration — This switch and router policy monitor enables you to check each target to see if SNMPv3 is active for device data transmission and SNMPv1 and SNMPv2 are not configured.

NOTE

For this check to pass, you must discover the products using SNMPv3 credentials.

Rule Violation Fix — If the policy monitor report shows a violation, configure SNMPv3 on the device. Remove SNMPv1 and SNMPv2 settings on the device, if configured.

Check for VLAN configurations match for each connection (IP only) — This switch and router policy monitor enables you to determine the consistency of VLAN configurations for each connection on the selected IP devices.

Rule Violation Fix — If the policy monitor report shows a violation, configure VLANs on each device to contain the same interface membership.

Configuration Rules — This switch and router policy monitor enables you to use predefined rules or create your own rules to compare content against a baseline (such as a product’s backup configuration file). A configuration rule is a logical expression built with configuration conditions and blocks. For more information, refer to “Viewing a predefined configuration rule” on page 1116.

-Predefined rules — The predefined rules include the following:

No Interface Shutdown Rule — Fails if any of the interfaces in the device are shut down.

Port Profile Interface Rule — Fails if any of the interfaces on the device do not have a port profile.

-User-defined rules — You can configure your own configuration rules using predefined conditions and blocks (refer to “Adding a configuration rule” on page 1120).

Host policy monitors

Host policy monitors enable you to set the following checks on host devices.

Check for multiple fabrics connections — This host policy monitor enables you to determine if each host is connected to multiple fabrics to prevent a single point of failure.

Available hosts include both automatic hosts and manual hosts. Automatic hosts are those hosts discovered through Host or VM Manager discovery. Manual hosts are those host enclosures that are manually created through Host Port Mapping in the fabric topology.

The Management application determines if the host has redundant connections to different fabrics based on discovery type and connection knowledge that the Management application collects; however, there is no guarantee that redundant paths exist to the same storage target.

Depending on how you discover the hosts, there are recommended configurations you should complete to avoid inaccuracy:

-Fabric discovery for manual host enclosures to fabric connections. Make sure there are Brocade HBAs on the host.

Brocade Network Advisor IP User Manual

1103

53-1003056-01

 

Page 1155
Image 1155
Brocade Communications Systems IP250 user manual Host policy monitors