HP StorageWorks MSA 2/8 HP StorageWorks Secure Fabric OS V1.0 User Guide (AA-R - Page 47

Creating Secure Fabric OS Policies

Page 47 highlights

Creating Secure Fabric OS Policies 3 You can use the Secure Fabric OS policies to customize access to the fabric. The FCS policy is the only required policy; all other policies are optional. Implementing Secure Fabric OS policies involves the following steps: ■ Determining which trusted switch you want to use to manage Secure Fabric OS. This switch should be in a physically secure area. ■ Enabling Secure Mode in the fabric, and specifying the trusted switch and one or more backup trusted switches. This automatically creates the FCS policy. ■ Determining which additional Secure Fabric OS policies you would like to implement in the fabric, then creating and activating those policies. To ensure the desired access, you must create an access policy for each management channel that you intend to use. ■ Verifying that the Secure Fabric OS policies you have created are operating as you intend. Testing a variety of scenarios to verify optimal policy settings is recommended. For troubleshooting information, see "Troubleshooting" on page 106. This chapter provides the following information: ■ Default Fabric and Switch Accessibility, page 48 ■ Enabling Secure Mode, page 49 ■ Modifying the FCS Policy, page 54 ■ Creating Secure Fabric OS Policies Other Than the FCS Policy, page 58 ■ Managing Secure Fabric OS Policies, page 76 Secure Fabric OS Version 1.0 User Guide 47

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129

47
Secure Fabric OS Version 1.0 User Guide
3
Creating Secure Fabric OS
Policies
You can use the Secure Fabric OS policies to customize access to the fabric. The
FCS policy is the only required policy; all other policies are optional.
Implementing Secure Fabric OS policies involves the following steps:
Determining which trusted switch you want to use to manage Secure
Fabric OS. This switch should be in a physically secure area.
Enabling Secure Mode in the fabric, and specifying the
trusted switch
and one
or more
backup trusted switches
. This automatically creates the FCS policy.
Determining which additional Secure Fabric OS policies you would like to
implement in the fabric, then creating and activating those policies. To ensure
the desired access, you must create an access policy for each management
channel that you intend to use.
Verifying that the Secure Fabric OS policies you have created are operating as
you intend. Testing a variety of scenarios to verify optimal policy settings is
recommended. For troubleshooting information, see “
Troubleshooting
” on
page 106.
This chapter provides the following information:
Default Fabric and Switch Accessibility
, page 48
Enabling Secure Mode
, page 49
Modifying the FCS Policy
, page 54
Creating Secure Fabric OS Policies Other Than the FCS Policy
, page 58
Managing Secure Fabric OS Policies
, page 76