Management Interface Security; Table 41 Examples Of Strict Fabric Merges; Table 42 Fabric Merges With Tolerant And Absent Combinations - HP SN3000B Administrator's Manual

Brocade fabric os administrator's guide - supporting fabric os v7.0.1 (53-1002446-01, march 2012)
Hide thumbs Also See for SN3000B:
Table of Contents

Advertisement

7

Management interface security

TABLE 41
Fabric-wide consistency policy setting
Strict/Tolerant
Strict/Absent
Strict/Strict
Table 42
TABLE 42
Fabric-wide consistency policy setting
Tolerant/Absent

Management interface security

You can secure an Ethernet management interface between two Brocade switches or Backbones
by implementing IPsec and IKE policies to create a tunnel that protects traffic flows. The tunnel has
at each end a Brocade switch or Backbone. There may be routers, gateways, and firewalls in
between the two ends.
ATTENTION
Enabling secure IPsec tunnels does not provide IPsec protection for traffic flows on the external
management interfaces of intelligent blades in a chassis, nor does it support protection of traffic
flows on FCIP interfaces.
Internet Protocol security (IPsec) is a framework of open standards that ensures private and secure
communications over Internet Protocol (IP) networks through the use of cryptographic security
services. The goal of IPsec is to provide the following capabilities:
166
Examples of strict fabric merges
Fabric A
SCC:S;DCC:S
SCC;DCC:S
SCC:S;DCC
SCC:S;DCC:S
SCC:S
DCC:S
SCC:S
has a matrix of merging fabrics with tolerant and absent policies.
Fabric merges with tolerant and absent combinations
Fabric A
SCC;DCC
DCC
SCC;DCC
DCC
Authentication — Ensures that the sending and receiving end-users and devices are known and
trusted by one another.
Data Integrity — Confirms that the data received was in fact the data transmitted.
Data Confidentiality — Protects the user data being transmitted, such as utilizing encryption to
avoid sending data in clear text.
Replay Protection — Prevents replay attack in which an attacker resends previously-intercepted
packets in an effort to fraudulently authenticate or otherwise masquerade as a valid user.
Expected behavior
Fabric B
SCC;DCC:S
Ports connecting switches are disabled.
SCC:S;DCC
SCC:S
DCC:S
Expected behavior
Fabric B
Error message logged.
Run fddCfg --fabwideset "policy_ID" from any
switch with the desired configuration to fix the
SCC
conflict. The secPolicyActivate command is blocked
until conflict is resolved.
SCC
Fabric OS Administrator's Guide
53-1002446-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fabric os v7.0.1

Table of Contents