Reference Guide

DCC policy restrictions..............................................................................................................................................................................................................................222
Creating a DCC policy...............................................................................................................................................................................................................................223
Deleting a DCC policy............................................................................................................................................................................................................................... 224
DCC policy behavior with Fabric-Assigned PWWNs..............................................................................................................................................................224
SCC Policies..............................................................................................................................................................................................................................................................226
Virtual Fabrics considerations for SCC policies .........................................................................................................................................................................226
Creating an SCC policy.............................................................................................................................................................................................................................226
Authentication policy for fabric elements..................................................................................................................................................................................................227
Virtual Fabrics considerations ..............................................................................................................................................................................................................228
E_Port authentication................................................................................................................................................................................................................................ 228
Device authentication policy..................................................................................................................................................................................................................230
AUTH policy restrictions..........................................................................................................................................................................................................................230
Authentication protocols............................................................................................................................................................................................................................ 231
Secret key pairs for DH-CHAP............................................................................................................................................................................................................232
FCAP configuration overview............................................................................................................................................................................................................... 233
Fabric-wide distribution of the authorization policy..................................................................................................................................................................236
IP Filter policy...........................................................................................................................................................................................................................................................236
Virtual Fabrics considerations for IP Filter policy ..................................................................................................................................................................... 236
Creating an IP Filter policy......................................................................................................................................................................................................................236
Cloning an IP Filter policy........................................................................................................................................................................................................................236
Displaying an IP Filter policy..................................................................................................................................................................................................................237
Saving an IP Filter policy.......................................................................................................................................................................................................................... 237
Activating an IP Filter policy................................................................................................................................................................................................................... 237
Deleting an IP Filter policy.......................................................................................................................................................................................................................237
IP Filter policy rules.....................................................................................................................................................................................................................................238
IP Filter policy enforcement...................................................................................................................................................................................................................240
Adding a rule to an IP Filter policy....................................................................................................................................................................................................... 241
Deleting a rule from an IP Filter policy...............................................................................................................................................................................................241
Aborting an IP Filter transaction............................................................................................................................................................................................................ 241
IP Filter policy distribution.........................................................................................................................................................................................................................241
Policy database distribution..............................................................................................................................................................................................................................242
Database distribution settings...............................................................................................................................................................................................................243
ACL policy distribution to other switches.......................................................................................................................................................................................244
Fabric-wide enforcement.........................................................................................................................................................................................................................244
Notes on joining a switch to the fabric............................................................................................................................................................................................. 245
Management interface security.......................................................................................................................................................................................................................247
Configuration examples............................................................................................................................................................................................................................248
IPsec protocols..............................................................................................................................................................................................................................................249
Security associations..................................................................................................................................................................................................................................250
Authentication and encryption algorithms.....................................................................................................................................................................................250
IPsec policies....................................................................................................................................................................................................................................................251
IKE policies.........................................................................................................................................................................................................................................................251
Creating the tunnel.......................................................................................................................................................................................................................................252
Example of an end-to-end transport tunnel mode...................................................................................................................................................................254
Maintaining the Switch Configuration File.......................................................................................................................................................................................................... 257
Configuration settings.......................................................................................................................................................................................................................................... 257
Configuration file format .........................................................................................................................................................................................................................258
Configuration file backup...................................................................................................................................................................................................................................259
Considerations for FTP server credentials with special characters.................................................................................................................................259
Uploading a configuration file in interactive mode......................................................................................................................................................................261
Brocade Fabric OS Administration Guide, 8.0.1
53-1004111-02 9