
2–Planning
Security
2-22 59265-02 B
Security Example: Switches and Adapters with AuthenticationConsider the fabric shown in Figure 2-9. In this fabric, Switch_1, Adapter_1, and
Switch_2 support authentication, while the JBOD and Adapter_2 do not. The
objective is to secure F_Ports and E_Ports in the fabric.
Figure 2-9. Security Example: Switches and AdaptersDevice: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Adapter_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
E_Port
F_Port F_Port
FL_Port
Device: JBOD
WWNS:10:00:00:d1:ee:18:d4:5e
10:00:00:d1:ee:18:d4:5f
10:00:00:d1:ee:18:d4:5g
Security: No
Device: Adapter_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No