HP StorageWorks 2/16V Brocade Secure Fabric OS Administrator's Guide (53-10002 - Page 62

Creating a MAC Policy, Table 3-2, Policy Name, IP address, Device, Port WWN, Switch, Domain, names

Page 62 highlights

3 Specify policy members by IP address, device port WWN, switch WWN, domain IDs, or switch names, depending on the policy. The valid methods for specifying policy members are listed in Table 3-2. Table 3-2 Valid Methods for Specifying Policy Members Policy Name IP address Device Switch Port WWN WWN Domain Switch IDs names FCS_POLICY No No Yes Yes Yes MAC Policies: RSNMP_POLICY Yes No No No No WSNMP_POLICY Yes No No No No TELNET_POLICY Yes No No No No HTTP_POLICY Yes No No No No API_POLICY Yes No No No No SES_POLICY No Yes No No No MS_POLICY No Yes No No No SERIAL_POLICY No No Yes Yes Yes FRONTPANEL_POLICY No No Yes Yes Yes OPTIONS_POLICY For information about valid input, see "Creating an Options Policy" on page 3-20. DCC_POLICY_nnn No Yes Yes Yes Yes SCC_POLICY No No Yes Yes Yes Note If IP addresses are used, "0" used for an octet indicates that any number can be matched for that octet. For example, 192.168.11.0 allows access for all IP devices in the range 192.168.11.0 through 192.168.11.255. If domain IDs or switch names are used, the corresponding switches must be in the fabric for the command to succeed. Creating a MAC Policy Use Management Access Control (MAC) policies to restrict the following management access to the fabric: • Access by hosts using SNMP, telnet/sectelnet/SSH, HTTP, API • Access by device ports using SCSI Enclosure Services (SES) or management server • Access through switch serial ports and front panels 3-12 Secure Fabric OS Administrator's Guide Publication Number: 53-1000244-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

3-12
Secure Fabric OS Administrator’s Guide
Publication Number: 53-1000244-01
3
Specify policy members by IP address, device port WWN, switch WWN, domain IDs, or switch names,
depending on the policy. The valid methods for specifying policy members are listed in
Table 3-2
.
Creating a MAC Policy
Use Management Access Control (MAC) policies to restrict the following management access to the
fabric:
Access by hosts using SNMP, telnet/sectelnet/SSH, HTTP, API
Access by device ports using SCSI Enclosure Services (SES) or management server
Access through switch serial ports and front panels
Table 3-2
Valid Methods for Specifying Policy Members
Policy Name
IP address
Device
Port WWN
Switch
WWN
Domain
IDs
Switch
names
FCS_POLICY
No
No
Yes
Yes
Yes
MAC Policies:
RSNMP_POLICY
Yes
No
No
No
No
WSNMP_POLICY
Yes
No
No
No
No
TELNET_POLICY
Yes
No
No
No
No
HTTP_POLICY
Yes
No
No
No
No
API_POLICY
Yes
No
No
No
No
SES_POLICY
No
Yes
No
No
No
MS_POLICY
No
Yes
No
No
No
SERIAL_POLICY
No
No
Yes
Yes
Yes
FRONTPANEL_POLICY
No
No
Yes
Yes
Yes
OPTIONS_POLICY
For information about valid input, see
“Creating an Options Policy”
on page 3-20.
DCC_POLICY_nnn
No
Yes
Yes
Yes
Yes
SCC_POLICY
No
No
Yes
Yes
Yes
Note
If IP addresses are used, “0” used for an octet indicates that any number can be matched for that octet.
For example, 192.168.11.0 allows access for all IP devices in the range 192.168.11.0 through
192.168.11.255. If domain IDs or switch names are used, the corresponding switches must be in the
fabric for the command to succeed.