HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.X Procedures User Guide (AA- - Page 106

single-switch, switched point-to-point, cascaded configuration, high-integrity fabric, fabric binding

Page 106 highlights

• Switch binding is a security method for restricting devices that connect to a particular switch. If the device is another switch, security handled by the SCC policy. If the device is a host or storage device, the Device Connection Control (DCC) policy binds those devices to a particular switch. Policies range from completely restrictive to reasonably flexible, based upon customer needs. • Port binding is a security method for restricting host or storage devices that connect to particular switch ports. The DCC policy also binds device ports to switch ports. Policies range from completely restrictive to reasonably flexible, based upon customer needs. There are two types of FICON configurations: • A single-switch configuration (called switched point-to-point) requires that the channel be configured to use single-byte addressing. If the channel is set up for two-byte addressing, the cascaded configuration setup applies. This type of configuration is described in "Configuring a single switch" on page 108. • A cascaded configuration (known as a high-integrity fabric) requires a list of authorized switches. This authorization feature (called fabric binding) is available through Secure Fabric OS. The fabric binding policy allows a predefined list of switches (domains) to exist in the fabric and prevents other switches from joining the fabric. This type of configuration is described in "Configuring a high-integrity fabric" on page 109. CUP protocol is used by IBM mainframe management programs to provide in-band management for FICON switches. When it is enabled, you can set up directors in a FICON environment to be managed through IBM mainframe management programs. CUP is an optionally licensed feature available with Fabric OS 4.4.0 or later. Table 18 summarizes the Fabric OS CLI commands that can be used for managing FICON fabrics. For detailed information on these commands, see the HP StorageWorks Fabric OS 5.x command reference guide. 106 Administering FICON fabrics

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248

106
Administering FICON fabrics
Switch binding is a security method for restricting devices that connect to a particular switch. If the
device is another switch, security handled by the SCC policy. If the device is a host or storage device,
the Device Connection Control (DCC) policy binds those devices to a particular switch. Policies range
from completely restrictive to reasonably flexible, based upon customer needs.
Port binding is a security method for restricting host or storage devices that connect to particular switch
ports. The DCC policy also binds device ports to switch ports. Policies range from completely
restrictive to reasonably flexible, based upon customer needs.
There are two types of FICON configurations:
A
single-switch
configuration (called
switched point-to-point
) requires that the channel be configured to
use single-byte addressing. If the channel is set up for two-byte addressing, the cascaded configuration
setup applies. This type of configuration is described in ”
Configuring a single switch
” on page 108.
A
cascaded configuration
(known as a
high-integrity fabric
) requires a list of authorized switches. This
authorization feature (called
fabric binding
) is available through Secure Fabric OS. The fabric binding
policy allows a predefined list of switches (domains) to exist in the fabric and prevents other switches
from joining the fabric. This type of configuration is described in ”
Configuring a high-integrity fabric
on page 109.
CUP protocol is used by IBM mainframe management programs to provide in-band management for
FICON switches. When it is enabled, you can set up directors in a FICON environment to be managed
through IBM mainframe management programs. CUP is an optionally licensed feature available with
Fabric OS 4.4.0 or later.
Table 18
summarizes the Fabric OS CLI commands that can be used for managing FICON fabrics. For
detailed information on these commands, see the
HP StorageWorks Fabric OS 5.x command reference
guide
.