Host policy monitors – Brocade Network Advisor SAN User Manual v12.1.0 User Manual

Page 1112

Advertising
background image

Brocade Network Advisor SAN User Manual

1065

53-1002948-01

Policy monitor overview

32

Check for SSH (secure Telnet) configuration — This switch and router policy monitor enables
you to check each target to see if SSH is enabled for device data transmission.

The preferred Management application product communication must be SSH for this check to
pass.

For Fabric OS products, verifies SSH access is enabled and telnet access is disabled through
the IP ACL active or applied policy rules. You should verify that the IP ACL active rules deny
telnet access to all.

For Fabric OS products, if the IPv6 interface is enabled, verifies both IPv4 and IPv6 through the
active IP ACL policy.

Rule Violation Fix — If the policy monitor report shows a violation, enable SSH on the device.
Disable Telnet settings on the device, if enabled.

Check for SNMPv3 (secure SNMP) configuration — This switch and router policy monitor
enables you to check each target to see if SNMPv3 is active for device data transmission and
SNMPv1 and SNMPv2 are not configured.

NOTE

For this check to pass, you must discover the products using SNMPv3 credentials.

Rule Violation Fix — If the policy monitor report shows a violation, configure SNMPv3 on the
device. Remove SNMPv1 and SNMPv2 settings on the device, if configured.

Host policy monitors

Host policy monitors enable you to set the following checks on host devices.

Check for multiple fabrics connections — This host policy monitor enables you to determine if
each host is connected to multiple fabrics to prevent a single point of failure.

Available hosts include both automatic hosts and manual hosts. Automatic hosts are those
hosts discovered through Host or VM Manager discovery. Manual hosts are those host
enclosures that are manually created through Host Port Mapping in the fabric topology.

The Management application determines if the host has redundant connections to different
fabrics based on discovery type and connection knowledge that the Management application
collects; however, there is no guarantee that redundant paths exist to the same storage target.

Depending on how you discover the hosts, there are recommended configurations you should
complete to avoid inaccuracy:

-

Fabric discovery for manual host enclosures to fabric connections (refer to

“Discovering

fabrics”

on page 41)

Make sure there are Brocade HBAs on the host.

Make sure to configure the host port mapping. (refer to

“Host port mapping overview”

on

page 425)

-

Host adaptor discovery with 2.1 or later driver for host to unmanaged fabric connections
(refer to

“Host discovery”

on page 59)

Make sure there are Brocade HBAs on the host.

Advertising