2–Planning

Security

59265-02 B 2-29

Security Example: Host Authentication

Consider the fabric shown in Figure 2-11. In this fabric, only Switch_2 and

Adapter_2/APP_2 support security, where APP_2 is a host application. The

objective is to secure the management server on Switch_2 from unauthorized

access by an adapter or an associated host application.

Figure 2-11. Security Example: Management Server
Device: Adapter_1/APP_1
Security: No
E_Port
F_Port F_Port
FL_Port
Device: Adapter_2/APP_2
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: Switch_1
Security: No
Device: Switch_3
Security: No