Q-Logic 5000 manual Security Example Switches and HBAs with Authentication

Models: 5000

1 130
Download 130 pages 53.11 Kb
Page 60
Image 60

3 – Planning Fabric Security

S

Consider the devices, switches, and management agents and evaluate the need for authorization and authentication. Also consider whether the security database is to distributed on the switches or centralized on a RADIUS server and how many servers to configure.

The following examples illustrate how to configure a security database:

„Security Example: Switches and HBAs with Authentication

„Security Example: RADIUS Server

„Security Example: Host Authentication

3.7.4.1

Security Example: Switches and HBAs with Authentication

Consider the fabric shown in Figure 3-9. In this fabric, Switch_1, HBA_1, and Switch_2 support authentication while the JBOD and HBA_2 do not. The objective is to secure F_Ports and E_Ports in the fabric. To do this, configure security on the devices that support security: Switch_1, Switch_2, and HBA_1.

Device: HBA_1

Device: HBA_2

WWN: 10:00:00:c0:dd:07:c3:4d

WWN: 10:00:00:c0:dd:07:c3:4f

Security: Yes

Security: No

 

 

Device: JBOD

 

 

WWNS:10:00:00:d1:ee:18:d4:5e

 

 

10:00:00:d1:ee:18:d4:5f

 

 

10:00:00:d1:ee:18:d4:5g

 

 

Security: No

F_Port

FL_Port

F_Port

Device: Switch_1

E_Port

Device: Switch_2

WWN: 10:00:00:c0:dd:07:e3:4c

 

WWN: 10:00:00:c0:dd:07:e3:4e

Security: Yes

 

Security: Yes

Figure 3-9. Security Example: Switches and HBAs

3-20

59096-04 A

Page 60
Image 60
Q-Logic 5000 manual Security Example Switches and HBAs with Authentication