HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.3.x administrator guide (569 - Page 254

Supported switches, Types of FICON configurations, Port binding, single-switch

Page 254 highlights

authenticated using digital certificates and unique private keys provided to the Switch Link Authentication Protocol (SLAP). • Switch binding is a security method for restricting devices that connect to a particular switch. If the device is another switch, this is handled by the SCC policy. If the device is a host or storage device, the Device Connection Control (DCC) policy binds those devices to a particular switch. Policies range from completely restrictive to reasonably flexible, based upon customer needs. • Port binding is a security method for restricting host or storage devices that connect to particular switch ports. The DCC policy also binds device ports to switch ports. Policies range from completely restrictive to reasonably flexible, based upon customer needs. For switches running Fabric OS 5.2.x and higher, the SCC ACL with strict fabric-wide consistency can also be used for switch binding, in addition to the Secure Fabric OS mechanism. Supported switches FICON protocol is supported on the following models and Fabric OS releases: • SAN Switch 2/32, Fabric OS v4.1.2 or later. • SAN Switch 4/32, SAN Switch 4/32B, Fabric OS v5.0.1b or later. • SAN Director 2/128, Fabric OS v4.2.0 or later. The default one-domain configuration is supported; dual domain configurations and mixed FC4-16 port blade configurations are not supported. • 4/256 SAN Director, Fabric OS v5.0.1b or later. A single-domain configuration is supported with a mix of 16-port and 32-port blades. Dual-domain configurations are not supported. Mixed port blade configurations of SAN Director 2/128 and 4/256 SAN Director port blades (FC2-16, FC4-16, or FC4-32) in the same director are not supported in a FICON environment. The following port blades can exist in a FICON environment; however, FICON device connection to ports on these blades is not supported: • FC4-16IP • FC4-48 • FR4-18i In an Admin Domain-enabled fabric, you should put all of the ports on these blades in an Admin Domain other than the one used for FICON ports. The ports on these blades should not belong to the zone in which FICON devices are present. The FC4-48 port blade is not supported for connecting to System z environments via FICON channels or via FCP zLinux on System z. To connect to the System z environment with the 4/256 SAN Director, use the FC4-16 or FC4-32 port blades. Both the 4/256 SAN Director and SAN Switch 4/32 require the port-based routing policy either in a single switch configuration, or a cascaded switch configuration on switches in the fabric that have FICON devices attached (option 1 of the aptPolicy command). Other switches in the fabric can use the default exchange-based routing policy (option 3 of the aptPolicy command) only when Open Systems devices are attached to those switches. Types of FICON configurations There are two types of FICON configurations: • A single-switch configuration (called switched point-to-point) requires that the channel be configured to use single-byte addressing. If the channel is set up for two-byte addressing, then the cascaded configuration setup applies. This type of configuration is described in "Configuring a single switch" on page 270. • A cascaded configuration (known as a high integrity fabric) requires a list of authorized switches. This authorization feature (called fabric binding) is available through Secure Fabric OS. The fabric binding policy allows a predefined list of switches (domains) to exist in the fabric and prevents other switches from joining the fabric. This type of configuration is described in "Configuring a high-integrity fabric" on page 270. 266 Administering FICON fabrics

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465

266
Administering FICON fabrics
authenticated using digital certificates and unique private keys provided to the Switch Link
Authentication Protocol (SLAP).
Switch binding
is a security method for restricting devices that connect to a particular switch. If the
device is another switch, this is handled by the SCC policy. If the device is a host or storage device, the
Device Connection Control (DCC) policy binds those devices to a particular switch. Policies range from
completely restrictive to reasonably flexible, based upon customer needs.
Port binding
is a security method for restricting host or storage devices that connect to particular switch
ports. The DCC policy also binds device ports to switch ports. Policies range from completely restrictive
to reasonably flexible, based upon customer needs.
For switches running Fabric OS 5.2.x and higher, the SCC ACL with strict fabric-wide consistency can also
be used for switch binding, in addition to the Secure Fabric OS mechanism.
Supported switches
FICON protocol is supported on the following models and Fabric OS releases:
SAN Switch 2/32, Fabric OS v4.1.2 or later.
SAN Switch 4/32, SAN Switch 4/32B, Fabric OS v5.0.1b or later.
SAN Director 2/128, Fabric OS v4.2.0 or later. The default one-domain configuration is supported;
dual domain configurations and mixed FC4-16 port blade configurations are not supported.
4/256 SAN Director, Fabric OS v5.0.1b or later. A single-domain configuration is supported with a
mix of 16-port and 32-port blades. Dual-domain configurations are not supported. Mixed port blade
configurations of SAN Director 2/128 and 4/256 SAN Director port blades (FC2-16, FC4-16, or
FC4-32) in the same director are not supported in a FICON environment.
The following port blades can exist in a FICON environment; however, FICON device connection to
ports on these blades is not supported:
FC4-16IP
FC4-48
FR4-18i
In an Admin Domain-enabled fabric, you should put all of the ports on these blades in an Admin
Domain other than the one used for FICON ports. The ports on these blades should not belong to the
zone in which FICON devices are present.
The FC4-48 port blade is not supported for connecting to System z environments via FICON channels
or via FCP zLinux on System z. To connect to the System z environment with the 4/256 SAN Director,
use the FC4-16 or FC4-32 port blades.
Both the 4/256 SAN Director and SAN Switch 4/32 require the port-based routing policy either in a
single switch configuration, or a cascaded switch configuration on switches in the fabric that have FICON
devices attached (option 1 of the
aptPolicy
command). Other switches in the fabric can use the default
exchange-based routing policy (option 3 of the
aptPolicy
command) only when Open Systems devices
are attached to those switches.
Types of FICON configurations
There are two types of FICON configurations:
A
single-switch
configuration (called
switched point-to-point
) requires that the channel be configured to
use single-byte addressing. If the channel is set up for two-byte addressing, then the cascaded
configuration setup applies. This type of configuration is described in ”
Configuring a single switch
” on
page 270.
A
cascaded configuration
(known as a
high integrity fabric
) requires a list of authorized switches. This
authorization feature (called
fabric binding
) is available through Secure Fabric OS. The fabric binding
policy allows a predefined list of switches (domains) to exist in the fabric and prevents other switches
from joining the fabric. This type of configuration is described in ”
Configuring a high-integrity fabric
on page 270.