HP StorageWorks 2/16V Brocade Fabric Watch Administrator's Guide (53-1000243-0 - Page 25

Resource Class Area, Security Class Areas, Table 1-7, Description, Indicates

Page 25 highlights

Fabric Watch Components 1 Resource Class Area Table 1-7 describes the Fabric Watch resource class area. Table 1-7 Resource Class Area Area Description Flash Monitor Monitors the compact flash space available by calculating the percentage of flash space consumed and comparing it with the configured high threshold value. Security Class Areas Table 1-8 lists Fabric Watch areas in the security class and describes what each area indicates. For details on each area, see the Secure Fabric OS Administrator's Guide. Table 1-8 Security Class Areas Area Indicates API Violation DCC Violation Front Panel Violation HTTP Violation Illegal Command Incompatible DB Invalid Certificates Invalid Signatures Invalid Timestamps Login Violation MS Violation No FCS RSNMP Violation An API access request reaches a secure switch from an unauthorized IP address. An unauthorized device attempts to log in to a secure fabric. A secure switch detects unauthorized front panel access. A browser access request reaches a secure switch from an unauthorized IP address. Commands permitted only to the primary Fibre Channel Switch (FCS) are executed on another switch. Secure switches with different version stamps have been detected. The primary FCS sends a certificate to all switches in the secure fabric before it sends configuration data. Receiving switches accept only packets with the correct certificate; any other certificates are invalid and represent an attempted security breach. If a switch cannot verify the signature of a packet, the switch rejects the packet and the signature becomes invalid. If a time interval becomes too great from the time a packet is sent to the time it is received, the timestamp of the packet becomes invalid and the switch rejects it. A login violation occurs when a secure fabric detects a login failure. An MS (Management Server) violation occurs when an access request reaches a secure switch from an unauthorized WWN (World Wide Name). The WWN appears in the ERRLOG. The switch has lost contact with the primary FCS. An RSNMP (Remote Simple Network Management Protocol) violation occurs when an SNMP (simple network management protocol) get operation reaches a secure switch from an unauthorized IP address. Fabric Watch Administrator's Guide 1-9 Publication Number: 53-1000243-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Fabric Watch Administrator’s Guide
1-9
Publication Number: 53-1000243-01
Fabric Watch Components
1
Resource Class Area
Table 1-7
describes the Fabric Watch resource class area.
Security Class Areas
Table 1-8
lists Fabric Watch areas in the security class and describes what each area indicates. For details
on each area, see the
Secure Fabric OS Administrator’s Guide
.
Table 1-7
Resource Class Area
Area
Description
Flash Monitor
Monitors the compact flash space available by calculating the percentage of flash
space consumed and comparing it with the configured high threshold value.
Table 1-8
Security Class Areas
Area
Indicates
API Violation
An API access request reaches a secure switch from an unauthorized IP
address.
DCC Violation
An unauthorized device attempts to log in to a secure fabric.
Front Panel Violation
A secure switch detects unauthorized front panel access.
HTTP Violation
A browser access request reaches a secure switch from an unauthorized IP
address.
Illegal Command
Commands permitted only to the primary Fibre Channel Switch (FCS) are
executed on another switch.
Incompatible DB
Secure switches with different version stamps have been detected.
Invalid Certificates
The primary FCS sends a certificate to all switches in the secure fabric before
it sends configuration data. Receiving switches accept only packets with the
correct certificate; any other certificates are invalid and represent an
attempted security breach.
Invalid Signatures
If a switch cannot verify the signature of a packet, the switch rejects the
packet and the signature becomes invalid.
Invalid Timestamps
If a time interval becomes too great from the time a packet is sent to the time
it is received, the timestamp of the packet becomes invalid and the switch
rejects it.
Login Violation
A login violation occurs when a secure fabric detects a login failure.
MS Violation
An MS (Management Server) violation occurs when an access request
reaches a secure switch from an unauthorized WWN (World Wide Name).
The WWN appears in the ERRLOG.
No FCS
The switch has lost contact with the primary FCS.
RSNMP Violation
An RSNMP (Remote Simple Network Management Protocol) violation
occurs when an SNMP (simple network management protocol)
get
operation
reaches a secure switch from an unauthorized IP address.