3 – Planning Fabric Security
S
Common Information Model (CIM): Provides for the management of the switch through
File Transfer Protocol (FTP): Provides for transferring files rapidly between the workstation and the switch using FTP. The default is enabled.
Management Server (MS): Enables or disables the management of the switch through
3.7
Fabric Security
An effective security profile begins with a security policy that states the requirements. A threat analysis is needed to define the plan of action followed by an implementation that meets the security policy requirements. Internet portals, such as remote access and
Most fabrics are located at a single site and are protected by physical security, such as
Fabric security is needed when security policy requirements are more demanding: for example, when fabrics span multiple locations and traditional physical protection is insufficient to protect the IT infrastructure. Another benefit of fabric security is that it creates a structure that helps prevent unintended changes to the fabric.
Fabric security consists of the following:
Connection Security
User Account Security
Port Binding
Device Security