Chapter 3 using zoning, Introduction, Zoning components – StorageTek StorageNet 4000 User Manual

Page 21: Easy setup and administration of zoning, Zone management, Chapter 3, “using zoning, Contains general information on managing and, Introduction -1, Zoning components -1, Easy setup and administration of zoning -1

Advertising
background image

8946121502

3-1

Chapter 3 Using ZONING

Introduction

This chapter contains general information and examples on managing and monitoring the
switch using ZONING.

ZONING Components

ZONING has several components. In addition to the zones themselves, zoning is comprised of
zone members, zone aliases, and zone configurations. These components are referred to as
zone objects.

Note:

You must have firmware version 1.4 or above to enable ZONING.

Easy Setup and Administration of ZONING

A zone is specified by a zone name. A zone member is specified by a physical fabric port
number, a node World Wide Name, or a port World Wide Name. Aliases (symbolic names) are
used for easy zones or members administration. A set of zones is configured during Zone
Specification.

You select which zone configuration is currently in effect. At any one time, you might decide
that ZONING is disabled or one ZONING configuration is in effect, such as for backup.

Zone Management

ZONING Management is performed using Telnet through either out-of-band or in-band
communication by logging into a switch. Any switch in the Fabric can be used; a change made
to the ZONING information on one switch is replicated through all Fabric switches.

ZONING uses logical device subsets within an SAN network for resource partitioning for
management and access control. The device sets may access one another within a zone. All
Fabric connected devices can be configured into one or more zones. Devices that are in
different zones do not see each other.

ZONING allows you to set up:

Barriers between systems with different operating environments or uses.

Logical subsets of closed user groups within the Fabric.

Special areas separate from the rest of the fabric. For example, for testing or
maintenance.

Temporary access among devices for specific purposes. For example, enterprise
backup.

Advertising