Understanding Zoning; Controlling Access Across A Fabric - HP 316095-B21 - StorageWorks Edge Switch 2/24 User Manual

Fw v06.xx/hafm sw v08.02.00 hp storageworks embedded web server user guide (aa-rtdrc-te, july 2004)
Hide thumbs Also See for 316095-B21 - StorageWorks Edge Switch 2/24:
Table of Contents

Advertisement

Configuring Zones

Understanding Zoning

Designing zoning can be a complex task, especially for multiswitch fabrics.
Consult with your managed product vendor's professional services organization
before configuring zoning.
This section is designed to help you understand the following concepts so that you
can more efficiently use Embedded Web Server features to configure and manage
zones across a multiswitch fabric:

Controlling Access Across a Fabric

Embedded Web Server zoning features enable you to establish zoning across a
fabric of devices attached to switches and directors by partitioning these devices
into groups called zones. A zone consists of devices that can access each other
through port-to-port connections. Devices in the same zone can recognize and
communicate with each other; devices in different zones cannot.
System administrators create zones to increase security and prevent data loss or
corruption by controlling access between devices (such as servers and data storage
units), or between separate user groups (such as engineering or human resources).
Zoning allows an administrator to:
82
Benefits of zoning.
How zoning works to control access to storage devices and servers across a
fabric.
Other methods of controlling access at the switch and at the server and device,
such as binding.
Merging zoned fabrics.
Basic terms and concepts of zoning that you must understand when
configuring zoning.
Establish barriers between devices that use different operating systems. For
example, it is often critical to separate servers and storage devices with
different operating systems because accidental transfer of information from
one to another can delete or corrupt data. Zoning prevents this by grouping
devices that use the same operating systems into zones.
Create logical subsets of closed user groups. Administrators can authorize
access rights to specific zones for specific user groups, thereby protecting
confidential data from unauthorized access.
Embedded Web Server User Guide

Advertisement

Table of Contents
loading

Table of Contents