2–Planning
Security
59229-05 A 2-15
Consider the devices, switches, and management agents and evaluate the need
for authorization and authentication. Also consider whether the security database
is to be distributed on the switches or centralized on a RADIUS server and how
many servers to configure.
The following examples illustrate how to configure a security database:
Security Example: Switches and HBAs with Authentication
Security Example: RADIUS Server
Security Example: Host Authentication
Security Example: Switches and HBAs with Authentication
Consider the fabric shown in Figure 2-2. In this fabric, Switch_1, HBA_1, and
Switch_2 support authentication while the JBOD and HBA_2 do not. The objective
is to secure F_Ports and E_Ports in the fabric. T o do this, configure security on the
devices that support security: Switch_1, Switch_2, and HBA_1.
Figure 2-2 Security Example: Switches and HBAs
E_Port
Device: Switch_1
WWN: 10:00:00:c0:dd:07:e3:4c
Security: Yes
Device: Switch_2
WWN: 10:00:00:c0:dd:07:e3:4e
Security: Yes
Device: HBA_1
WWN: 10:00:00:c0:dd:07:c3:4d
Security: Yes
F_Port
F_Port
FL_Port
Device: JBOD
WWNS:10:00:00:d1:ee:18:d4:5e
10:00:00:d1:ee:18:d4:5f
10:00:00:d1:ee:18:d4:5g
Security: No
Device: HBA_2
WWN: 10:00:00:c0:dd:07:c3:4f
Security: No