HP StorageWorks 2/16V Brocade Fabric Watch Administrator's Guide - Supporting - Page 25

TABLE 7, Secure Fabric OS Administrator's Guide

Page 25 highlights

Fabric Watch components 1 Resource class area Table 7 describes the Product Name resource class area. TABLE 7 Resource class area Area Description Flash Monitor Monitors the compact flash space available by calculating the percentage of flash space consumed and comparing it with the configured high threshold value. Security class areas Table 8 lists Product Name areas in the security class and describes what each area indicates. For details on each area, see the Secure Fabric OS Administrator's Guide. TABLE 8 Security class areas Area Indicates API Violation DCC Violation Front Panel Violation HTTP Violation Illegal Command Incompatible DB Invalid Certificates Invalid Signatures Invalid Timestamps Login Violation MS Violation No FCS RSNMP Violation SCC Violation Serial Violation SES Violation An API access request reaches a secure switch from an unauthorized IP address. An unauthorized device attempts to log in to a secure fabric. A secure switch detects unauthorized front panel access. A browser access request reaches a secure switch from an unauthorized IP address. Commands permitted only to the primary Fibre Channel Switch (FCS) are executed on another switch. Secure switches with different version stamps have been detected. The primary FCS sends a certificate to all switches in the secure fabric before it sends configuration data. Receiving switches accept only packets with the correct certificate; any other certificates are invalid and represent an attempted security breach. If a switch cannot verify the signature of a packet, the switch rejects the packet and the signature becomes invalid. If a time interval becomes too great from the time a packet is sent to the time it is received, the timestamp of the packet becomes invalid and the switch rejects it. A login violation occurs when a secure fabric detects a login failure. An MS (Management Server) violation occurs when an access request reaches a secure switch from an unauthorized WWN (World Wide Name). The WWN appears in the ERRLOG. The switch has lost contact with the primary FCS. An RSNMP (Remote Simple Network Management Protocol) violation occurs when an SNMP (simple network management protocol) get operation reaches a secure switch from an unauthorized IP address. An SCC violation occurs when an unauthorized switch tries to join a secure fabric. The WWN of the unauthorized switch appears in the ERRLOG. A serial violation occurs when a secure switch detects an unauthorized serial port connection request. An SES violation occurs when an SES (SCSI Enclosed Services) request reaches a secure switch from an unauthorized WWN. Fabric Watch Administrator's Guide 9 53-0000438-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102

Fabric Watch Administrator’s Guide
9
53-0000438-01
Fabric Watch components
1
Resource class area
Table 7
describes the Product Name resource class area.
Security class areas
Table 8
lists Product Name areas in the security class and describes what each area indicates. For
details on each area, see the
Secure Fabric OS Administrator’s Guide
.
TABLE 7
Resource class area
Area
Description
Flash Monitor
Monitors the compact flash space available by calculating the percentage of flash space
consumed and comparing it with the configured high threshold value.
TABLE 8
Security class areas
Area
Indicates
API Violation
An API access request reaches a secure switch from an unauthorized IP address.
DCC Violation
An unauthorized device attempts to log in to a secure fabric.
Front Panel Violation
A secure switch detects unauthorized front panel access.
HTTP Violation
A browser access request reaches a secure switch from an unauthorized IP address.
Illegal Command
Commands permitted only to the primary Fibre Channel Switch (FCS) are executed on
another switch.
Incompatible DB
Secure switches with different version stamps have been detected.
Invalid Certificates
The primary FCS sends a certificate to all switches in the secure fabric before it sends
configuration data. Receiving switches accept only packets with the correct certificate;
any other certificates are invalid and represent an attempted security breach.
Invalid Signatures
If a switch cannot verify the signature of a packet, the switch rejects the packet and the
signature becomes invalid.
Invalid Timestamps
If a time interval becomes too great from the time a packet is sent to the time it is
received, the timestamp of the packet becomes invalid and the switch rejects it.
Login Violation
A login violation occurs when a secure fabric detects a login failure.
MS Violation
An MS (Management Server) violation occurs when an access request reaches a
secure switch from an unauthorized WWN (World Wide Name). The WWN appears in
the ERRLOG.
No FCS
The switch has lost contact with the primary FCS.
RSNMP Violation
An RSNMP (Remote Simple Network Management Protocol) violation occurs when an
SNMP (simple network management protocol)
get
operation reaches a secure switch
from an unauthorized IP address.
SCC Violation
An SCC violation occurs when an unauthorized switch tries to join a secure fabric. The
WWN of the unauthorized switch appears in the ERRLOG.
Serial Violation
A serial violation occurs when a secure switch detects an unauthorized serial port
connection request.
SES Violation
An SES violation occurs when an SES (SCSI Enclosed Services) request reaches a
secure switch from an unauthorized WWN.