2–Planning
Security
59265-02 B 2-29
Security Example: Host AuthenticationConsider the fabric shown in Figure 2-11. In this fabric, only Switch_2 and
Adapter_2/APP_2 support security, where APP_2 is a host application. The
objective is to secure the management server on Switch_2 from unauthorized
access by an adapter or an associated host application.
Figure 2-11. Security Example: Management ServerDevice: Adapter_1/APP_1
Security: No
E_Port
F_Port F_Port
FL_Port
Device: Adapter_2/APP_2
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Switch_1
Security: No
Device: Switch_3
Security: No