HP StorageWorks 8/80 HP StorageWorks Fabric OS 6.1.x administrator guide (5697 - Page 197

Zoning enforcement

Page 197 highlights

• Disabled Configuration-The effective configuration is removed from flash memory. When you disable the effective configuration, the Advanced Zoning feature is disabled on the fabric, and all devices within the fabric can communicate with all other devices (unless you previously set up a default zone, as described in "Activating default zones" on page 403). This does not mean that the zoning database is deleted, however, only that there is no configuration active in the fabric. On power-up, the switch automatically reloads the saved configuration. If a configuration was active when it was saved, the same configuration is reinstated on the local switch with an autorun of the cfgEnable command. Zoning enforcement Zoning enforcement describes a set of predefined rules that the switch uses to determine where to send incoming data. There are two methods of enforcement: software-enforced and hardware-enforced zoning. Zoning enables you to restrict access to devices in a fabric. Software-enforced zoning prevents hosts from discovering unauthorized target devices, while hardware-enforced zoning prevents a host from accessing a device it is not authorized to access. Software-enforced zoning Software-enforced zoning is used for any mixed zone (a zone with both WWN and domain,port members). Software-enforced zoning: • Is also called "soft zoning," "name server zoning," "fabric-based zoning," or "session-based zoning." • Is available on 1, 2, 4, 8 and 10 Gbps platforms. • Prevents hosts from discovering unauthorized target devices. • Ensures that the name server does not return any information to an unauthorized initiator in response to a name server query. • Does not prohibit access to the device. If an initiator has knowledge of the network address of a target device, it does not need to query the name server to access it, which could lead to undesired access to a target device by unauthorized hosts. • Is exclusively enforced through selective information presented to end nodes through the fabric Simple Name Server (SNS). When an initiator queries the name server for accessible devices in the fabric, the name server returns only those devices that are in the same zone as the initiator. Devices that are not part of the zone are not returned as accessible devices. Hardware-enforced zoning Hardware-enforced zoning means that each frame is checked by hardware (the ASIC) before it is delivered to a zone member and is discarded if there is a zone mismatch. When hardware-enforced zoning is active, the Fabric OS switch monitors the communications and blocks any frames that do not comply with the effective zone configuration. The switch performs this blocking at the transmit side of the port on which the destination device is located. Hardware-enforced zoning is in effect when all of the members of a zone are identified the same way, either using WWNs or domain,port notation. If a zone does not have either all WWN or all domain,port entries, then software-enforced zoning is in effect. For overlapping zones (in which zone members appear in two or more zones), hardware-enforced zoning is in effect as long as the overlapping zones have either all WWN or all domain,port entries. Hardware-enforced zoning: • Is also called hard zoning or ASIC-enforced zoning. • Prevents a host from discovering unauthorized target devices. • Prevents a host from accessing a device it is not authorized to access. • Is enforced at the ASIC level. Each ASIC maintains a list of source port IDs that have permission to access any of the ports on that ASIC. Fabric OS 6.1.x administrator guide 197

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492

Fabric OS 6.1.x administrator guide
197
Disabled Configuration
The effective configuration is removed from flash memory.
When you disable the effective configuration, the Advanced Zoning feature is disabled on the fabric, and
all devices within the fabric can communicate with all other devices (unless you previously set up a default
zone, as described in ”
Activating default zones
” on page 403). This does not mean that the zoning
database is deleted, however, only that there is no configuration active in the fabric.
On power-up, the switch automatically reloads the saved configuration. If a configuration was active when
it was saved, the same configuration is reinstated on the local switch with an autorun of the
cfgEnable
command.
Zoning enforcement
Zoning enforcement describes a set of predefined rules that the switch uses to determine where to send
incoming data. There are two methods of enforcement: software-enforced and hardware-enforced zoning.
Zoning enables you to restrict access to devices in a fabric. Software-enforced zoning prevents hosts from
discovering unauthorized target devices, while hardware-enforced zoning prevents a host from accessing a
device it is not authorized to access.
Software-enforced zoning
Software-enforced zoning is used for any mixed zone (a zone with both WWN and
domain,port
members).
Software-enforced zoning:
Is also called “soft zoning,” “name server zoning,” “fabric-based zoning,” or “session-based zoning.”
Is available on 1, 2, 4, 8 and 10 Gbps platforms.
Prevents hosts from discovering unauthorized target devices.
Ensures that the name server does not return any information to an unauthorized initiator in response to
a name server query.
Does not prohibit access to the device. If an initiator has knowledge of the network address of a target
device, it does not need to query the name server to access it, which could lead to undesired access to
a target device by unauthorized hosts.
Is exclusively enforced through selective information presented to end nodes through the fabric Simple
Name Server (SNS). When an initiator queries the name server for accessible devices in the fabric, the
name server returns only those devices that are in the same zone as the initiator. Devices that are not
part of the zone are not returned as accessible devices.
Hardware-enforced zoning
Hardware-enforced zoning means that each frame is checked by hardware (the ASIC) before it is delivered
to a zone member and is discarded if there is a zone mismatch. When hardware-enforced zoning is
active, the Fabric OS switch monitors the communications and blocks any frames that do not comply with
the effective zone configuration. The switch performs this blocking at the transmit side of the port on which
the destination device is located.
Hardware-enforced zoning is in effect when all of the members of a zone are identified the same way,
either using WWNs or
domain,port
notation.
If a zone does not have either all WWN or all
domain,port
entries, then software-enforced zoning is in
effect.
For overlapping zones (in which zone members appear in two or more zones), hardware-enforced zoning
is in effect as long as the overlapping zones have either all WWN or all
domain,port
entries.
Hardware-enforced zoning:
Is also called
hard zoning
or
ASIC-enforced zoning.
Prevents a host from discovering unauthorized target devices.
Prevents a host from accessing a device it is not authorized to access.
Is enforced at the ASIC level. Each ASIC maintains a list of source port IDs that have permission to
access any of the ports on that ASIC.