D

3 – Planning Fabric Security

3.5.2.2

Security Example: Host Authentication

Consider the fabric shown in Figure 3-4. In this fabric, only Switch_2 and

HBA_2/APP_2 support security, where APP_2 is a host application. The objective is to secure the management server on Switch_2 from unauthorized access by an HBA or an associated host application.

Device: HBA_1/APP_1

Device: HBA_2/APP_2

Security: No

WWN: 10:00:00:c0:dd:07:c3:4d

 

Security: Yes

F_Port

E_Port

F_Port

 

Device: Switch_1

Security: No

Device: Switch_2

WWN: 10:00:00:c0:dd:07:e3:4e

Security: Yes

Device: Switch_3

Security: No

FL_Port

Device: JBOD

Security: No

Figure 3-4. Security Example: Management Server

1.Create a security set (Security_Set_2) on Switch_2.

59043-03 A

3-15

Page 55
Image 55
Q-Logic 64 manual Security Example Host Authentication, Create a security set SecuritySet2 on Switch2