Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 21

Advertising
background image

Brocade Network Advisor SAN User Manual

xxi

53-1003154-01

Chapter 17

Security Management

Layer 2 access control list management. . . . . . . . . . . . . . . . . . . . .653

Fabric OS Layer 2 ACL configuration . . . . . . . . . . . . . . . . . . . .653
Creating a Layer 2 ACL from a saved configuration. . . . . . . . .660
Deleting a Layer 2 ACL configuration from the application. . .661
Deleting a Layer 2 ACL configuration from the switch. . . . . . .661

Security configuration deployment . . . . . . . . . . . . . . . . . . . . . . . . .662

Deploying a security configuration on demand . . . . . . . . . . . .663
Saving a security configuration deployment . . . . . . . . . . . . . .664
Scheduling a security configuration deployment. . . . . . . . . . .665

Chapter 18

FC-FC Routing Service Management

Devices that support Fibre Channel routing . . . . . . . . . . . . . . . . . .669

Fibre Channel routing overview . . . . . . . . . . . . . . . . . . . . . . . . . . . .670

Guidelines for setting up Fibre Channel routing . . . . . . . . . . . . . . .671

Connecting edge fabrics to a backbone fabric . . . . . . . . . . . . . . . .672

Configuring routing domain IDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 674

Chapter 19

Virtual Fabrics

Virtual Fabrics overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .675

Terminology for Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . .676

Virtual Fabrics requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .677

FICON best practices for Virtual Fabrics . . . . . . . . . . . . . . . . . . . . .679

Configuring Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .680

Enabling Virtual Fabrics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .681
Disabling Virtual Fabrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .682
Creating a logical switch or base switch . . . . . . . . . . . . . . . . .
682
Finding the physical chassis for a logical switch . . . . . . . . . . .685
Finding the logical switch from a physical chassis . . . . . . . . .685
Assigning ports to a logical switch . . . . . . . . . . . . . . . . . . . . . .
685
Removing ports from a logical switch. . . . . . . . . . . . . . . . . . . .686
Deleting a logical switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .687
Configuring fabric-wide parameters for a logical fabric. . . . . .688
Applying logical fabric settings to all associated
logical switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
689
Moving a logical switch to a different fabric. . . . . . . . . . . . . . .689
Changing a logical switch to a base switch . . . . . . . . . . . . . . .690

Chapter 20

SAN Encryption Configuration

Encryption Center features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .694

Encryption user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .695

Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .696

Using authentication cards with a card reader . . . . . . . . . . . .696
Registering authentication cards from a card reader . . . . . . .697
Registering authentication cards from the database . . . . . . .699

Advertising