
3 – Planning Fabric Security
S
Consider the devices, switches, and management agents and evaluate the need for authorization and authentication. Also consider whether the security database is to distributed on the switches or centralized on a RADIUS server and how many servers to configure.
The following examples illustrate how to configure a security database:
Security Example: Switches and HBAs with Authentication
Security Example: RADIUS Server
Security Example: Host Authentication
3.7.4.1
Security Example: Switches and HBAs with Authentication
Consider the fabric shown in Figure
Device: HBA_1 | Device: HBA_2 |
WWN: 10:00:00:c0:dd:07:c3:4d | WWN: 10:00:00:c0:dd:07:c3:4f |
Security: Yes | Security: No |
|
| Device: JBOD |
|
| WWNS:10:00:00:d1:ee:18:d4:5e |
|
| 10:00:00:d1:ee:18:d4:5f |
|
| 10:00:00:d1:ee:18:d4:5g |
|
| Security: No |
F_Port | FL_Port | F_Port |
Device: Switch_1 | E_Port | Device: Switch_2 |
WWN: 10:00:00:c0:dd:07:e3:4c |
| WWN: 10:00:00:c0:dd:07:e3:4e |
Security: Yes |
| Security: Yes |