HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.2.x administrator guide (569 - Page 104

Configuring ACL policies

Page 104 highlights

Configuring ACL policies All policy modifications are saved in volatile memory until those changes are saved or activated. You can create multiple sessions to the switch from one or more hosts. However, Fabric OS allows only one ACL transaction at a time. If a second ACL transaction is started, it fails. The Secure Fabric OS and Fabric OS SCC and DCC policies are not interchangeable. Uploading and saving a copy of the Fabric OS configuration after creating policies is strongly recommended. Use the configUpload command to upload a copy of the configuration file. For more information about this command, see the Fabric OS Command Reference. NOTE: All changes, including the creation of new policies, are saved and activated on the local switch only-unless the switch is in a fabric that has a strict or tolerant fabric-wide consistency policy for the ACL policy type (SCC or DCC). See "Distributing the policy database" on page 110 for more information on the database settings and fabric-wide consistency policy. Use the instructions in the following sections to manage DCC and SCC policies: • "Displaying ACL policies" on page 105 Displays a list of all active and defined ACL policies on the switch. • "Configuring a DCC policy" on page 105 Multiple DCC policies can be created using the naming convention DCC_POLICY_nnn, with nnn representing a unique string. • "Creating an SCC policy" on page 107 One SCC policy can be created. • "Saving changes to ACL policies" on page 108 Save changes to memory without actually implementing the changes within the fabric or to the switch. This saved but inactive information is known as the "defined policy set." • "Activating changes to ACL policies" on page 108 Simultaneously save and implement all the policy changes made since the last time changes were activated. The activated policies are known as the "active policy set." • "Adding a member to an existing policy" on page 109 Add one or more members to a policy. The aspect of the fabric covered by each policy is closed to access by all devices/switches that are not listed in that policy. • "Removing a member from a policy" on page 109 Remove one or more members from a policy. If all members are removed from a policy, that aspect of the fabric becomes closed to all access. • "Deleting a policy" on page 109 Delete an entire policy; deleting a policy opens up that aspect of the fabric to all access. 104 Configuring advanced security

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447

104
Configuring advanced security
Configuring ACL policies
All policy modifications are saved in volatile memory until those changes are saved or activated. You can
create multiple sessions to the switch from one or more hosts. However, Fabric OS allows only one ACL
transaction at a time. If a second ACL transaction is started, it fails.
The Secure Fabric OS and Fabric OS SCC and DCC policies are not interchangeable. Uploading and
saving a copy of the Fabric OS configuration after creating policies is strongly recommended. Use the
configUpload
command to upload a copy of the configuration file. For more information about this
command, see the
Fabric OS Command Reference
.
NOTE:
All changes, including the creation of new policies, are saved and activated on the local switch
only—unless the switch is in a fabric that has a strict or tolerant fabric-wide consistency policy for the ACL
policy type (SCC or DCC). See ”
Distributing the policy database
” on page 110 for more information on the
database settings and fabric-wide consistency policy.
Use the instructions in the following sections to manage DCC and SCC policies:
Displaying ACL policies
” on page 105
Displays a list of all active and defined ACL policies on the switch.
Configuring a DCC policy
” on page 105
Multiple DCC policies can be created using the naming convention DCC_POLICY_
nnn
, with
nnn
representing a unique string.
Creating an SCC policy
” on page 107
One SCC policy can be created.
Saving changes to ACL policies
” on page 108
Save changes to memory without actually implementing the changes within the fabric or to the switch.
This saved but inactive information is known as the “defined policy set.”
Activating changes to ACL policies
” on page 108
Simultaneously save and implement all the policy changes made since the last time changes were
activated. The activated policies are known as the “active policy set.”
Adding a member to an existing policy
” on page 109
Add one or more members to a policy. The aspect of the fabric covered by each policy is closed to
access by all devices/switches that are not listed in that policy.
Removing a member from a policy
” on page 109
Remove one or more members from a policy. If all members are removed from a policy, that aspect of
the fabric becomes closed to all access.
Deleting a policy
” on page 109
Delete an entire policy; deleting a policy opens up that aspect of the fabric to all access.