Zoning - EMC Connectrix EC-1200 Planning Manual

2 gb/s enterprise storage network system
Table of Contents

Advertisement

Zoning and Naming
3

Zoning

One aspect that makes switched fabrics so powerful is the ability of
all devices attached to a fabric to communicate with each other. In a
storage area network environment, however, this can create some
manageability problems; for example, interoperability issues can
arise between different types of hosts. There might also be a
requirement to segment traffic in a switch, to provide added security
between functional groups or to provide separation between
production and test environments.
Connectrix supports the concept of zoning, which allows partitioning
a fabric into multiple, separate entities. Devices assigned to one zone
can communicate with other devices in the same zone, but not with
devices in other zones.
Connectrix zoning nomenclature consists of zones, zone sets, and zone
members.
A zone set is a collection of zones that are activated in a fabric. The
Connectrix Manager maintains a set of zone sets. Each zone set has a
unique name.
Zones are built with a collection of Members. Each zone has a unique
name. Each Member may be the WWPN of a logged in N_Port, a
Nickname for the N_Port, or a physical port number on a specific
switch.
Zoning is used with the Connectrix to control the device discovery
process. A switch is capable of discovering the addresses of all
devices connected to it, which means that, potentially, each of these
devices can reach all other devices. Zone configuration information is
stored in the Name Server in the switch; therefore, when zoning is
enforced, only those devices within a zone can reach each other.
The Connectrix Manager provides a graphical user interface (GUI) tool for
zoning implementation. Refer to the Connectrix Manager User Guide.
The zoning implementation in the Connectrix is based on the ANSI
standard for Simple Name Servers, and effective access control
requires that the N_Ports abide by Simple Name Server policies. For
example, the HBAs must never use a hardware probe to discover
devices; instead, discovery must be performed solely through the
services of the Name Server.
3-2
Connectrix v6.02 Planning Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents