HP 1606 FICON Administrator's Guide v6.4.0 (53-1001771-01, June 2010) - Page 23

Error reporting, Secure access control

Page 23 highlights

Access Control in FICON 1 Error reporting Non-implicit (such as NOS recognized or bit error rate threshold exceeded) and implicit (FRU failure) link incidents are reported to registered listeners on the local switch. The RMF 74-7 record (FICON Director Activity Report, which is the same RMF Record containing the average frame pacing delay info) reports port errors, which in turn are also reported back to the mainframe host management consoles. Secure access control Binding is a method used to prevent devices from attaching to the switch. Secure Access Control List (ACL) provides the following fabric, switch, and port binding features: - Fabric binding is a security method for restricting switches within a multiple-switch fabric. Use an SCC policy to prevent unauthorized switches from joining a fabric. - Switch binding is a security method for restricting devices that connect to a particular switch. If the device is another switch, this is handled by the SCC policy. If the device is a host or storage device, the Device Connection Control (DCC) policy binds those devices to a particular switch. Policies range from completely restrictive to reasonably flexible, based upon customer needs. SCC ACL with strict fabric-wide consistency is necessary for FICON switch binding. - Port binding is a security method for restricting host or storage devices that connect to particular switch ports. The DCC policy also binds device ports to switch ports. Policies range from completely restrictive to reasonably flexible, based on customer needs. Figure 8 on page 12 demonstrates the three types of binding you can use depending on the security requirements of your fabric. FICON Administrator's Guide 11 53-1001771-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

FICON Administrator’s Guide
11
53-1001771-01
Access Control in FICON
1
Error reporting
Non-implicit (such as NOS recognized or bit error rate threshold exceeded) and implicit (FRU failure)
link incidents are reported to registered listeners on the local switch. The RMF 74-7 record (FICON
Director Activity Report, which is the same RMF Record containing the average frame pacing delay
info) reports port errors, which in turn are also reported back to the mainframe host management
consoles.
Secure access control
Binding is a method used to prevent devices from attaching to the switch. Secure Access Control
List (ACL)
provides the
following fabric, switch, and port binding features:
-
Fabric binding
is a security method for restricting switches within a multiple-switch fabric.
Use an SCC policy to prevent unauthorized switches from joining a fabric.
-
Switch binding
is a security method for restricting devices that connect to a particular
switch. If the device is another switch, this is handled by the SCC policy. If the device is a
host or storage device, the Device Connection Control (DCC) policy binds those devices to
a particular switch. Policies range from completely restrictive to reasonably flexible, based
upon customer needs.
SCC ACL with strict fabric-wide consistency is necessary for FICON switch binding.
-
Port binding
is a security method for restricting host or storage devices that connect to
particular switch ports. The DCC policy also binds device ports to switch ports. Policies
range from completely restrictive to reasonably flexible, based on customer needs.
Figure 8
on page 12 demonstrates the three types of binding you can use depending on the
security requirements of your fabric.