Port Security Manual Configuration; Wwn Identification Guidelines - Cisco Nexus 5000 Series Configuration Manual

Nx-os san
Hide thumbs Also See for Nexus 5000 Series:
Table of Contents

Advertisement

Port Security Manual Configuration

Device Connection
Request
S1, F3 (auto-learning on)
P5, N3, F3
P7, N3, F9
Related Topics
Auto-Learning Device Authorization, on page 262
Port Security Manual Configuration
You can manually configure port security.
Step 1
Identify the WWN of the ports that need to be secured.
Step 2
Secure the fWWN to an authorized nWWN or pWWN.
Step 3
Activate the port security database.
Step 4
Verify your configuration.

WWN Identification Guidelines

The WWN Identification has the following configuration guidelines and limitations:
• Identify switch ports by the interface or by the fWWN.
• Identify devices by the pWWN or by the nWWN.
• If an N port is allowed to log in to a SAN switch port F, that N port can only log in through the specified
• If an N port's nWWN is bound to an F port WWN, all pWWNs in the N port are implicitly paired with
• TE port checking is done on each VSAN in the allowed VSAN list of the VSAN trunk port.
• You must configure all port channel xE ports with the same set of WWNs in the same SAN port channel.
• E port security is implemented in the port VSAN of the E port. In this case, the sWWN is used to secure
• Once activated, you can modify the configuration database without any effect on the active database.
Cisco Nexus 5000 Series NX-OS SAN Switching Configuration Guide, Release 5.2(1)N1(1)
264
Authorization
Permitted
Permitted
Permitted
F port.
the F port.
authorization checks.
Condition
Reason
5
No conflict.
6
Wildcard ( * ) match for
F3 and N3.
6
Wildcard ( * ) match for
N3.
Configuring Port Security
OL-27583-01

Advertisement

Table of Contents
loading

Table of Contents