Deployment Guide

Unblocking Telnet........................................................................... 205
Listener applications................................................................................... 205
Ports and applications used by switches.................................................... 206
Port configuration............................................................................207
Configuring Security Policies...............................................................................................209
ACL policies overview.................................................................................209
How the ACL policies are stored.....................................................209
Policy members...............................................................................210
ACL policy management.............................................................................210
Displaying ACL policies...................................................................211
Saving changes without activating the policies...............................211
Activating ACL policy changes........................................................211
Deleting an ACL policy....................................................................211
Adding a member to an existing ACL policy................................... 212
Removing a member from an ACL policy....................................... 212
Abandoning unsaved ACL policy changes..................................... 212
FCS policies................................................................................................213
FCS policy restrictions.................................................................... 213
Ensuring fabric domains share policies ..........................................214
Creating an FCS policy................................................................... 215
Modifying the order of FCS switches.............................................. 215
FCS policy distribution.................................................................... 216
Device Connection Control policies............................................................ 216
Virtual Fabrics considerations ....................................................217
DCC policy restrictions....................................................................217
Creating a DCC policy.....................................................................217
Deleting a DCC policy.....................................................................218
DCC policy behavior with Fabric-Assigned PWWNs...................... 219
SCC Policies............................................................................................... 220
Virtual Fabrics considerations for SCC policies .......................220
Creating an SCC policy...................................................................221
Authentication policy for fabric elements.................................................... 221
Virtual Fabrics considerations ....................................................222
E_Port authentication......................................................................222
Device authentication policy............................................................224
AUTH policy restrictions..................................................................225
Authentication protocols..................................................................226
Secret key pairs for DH-CHAP........................................................227
FCAP configuration overview..........................................................228
Fabric-wide distribution of the authorization policy......................... 230
IP Filter policy..............................................................................................231
Virtual Fabrics considerations for IP Filter policy .................... 231
Creating an IP Filter policy..............................................................231
Cloning an IP Filter policy............................................................... 232
Displaying an IP Filter policy...........................................................232
Saving an IP Filter policy.................................................................232
Activating an IP Filter policy............................................................232
Deleting an IP Filter policy.............................................................. 233
IP Filter policy rules.........................................................................233
IP Filter policy enforcement.............................................................236
Adding a rule to an IP Filter policy.................................................. 237
Deleting a rule from an IP Filter policy............................................ 237
Aborting an IP Filter transaction......................................................237
IP Filter policy distribution............................................................... 237
Policy database distribution........................................................................ 238
Database distribution settings.........................................................239
8
Fabric OS Administrators Guide
53-1003130-01