HP StorageWorks MSA 2/8 HP StorageWorks Secure Fabric OS V1.0 User Guide (AA-R - Page 59

Table 3: Valid Methods for Specifying Policy Members, Creating a MAC Policy

Page 59 highlights

Creating Secure Fabric OS Policies Table 3: Valid Methods for Specifying Policy Members Policy Name FCS_POLICY MAC Policies RSNMP_POLICY WSNMP_POLICY TELNET_POLICY HTTP_POLICY API_POLICY MS_POLICY SERIAL_POLICY FRONTPANEL_POLICY OPTIONS_POLICY DCC_POLICY_nnn SCC_POLICY IP Address Device Port WWN Switch Domain Switch WWN IDs Names No No Yes Yes Yes No No No No No Yes No No No No Yes No No No No Yes No No No No Yes No No No No Yes No No No No No Yes No No No No No Yes Yes Yes No No Yes Yes Yes For information about valid input, see "Creating an Options Policy" on page 70. No Yes Yes Yes Yes No No Yes Yes Yes Note: If IP addresses are used, you can use "0" in an octet to indicate that any number can be matched for that octet. For example, 192.168.11.0 would allow access for all IP devices in the network 192.168.11. If Domain IDs or switch names are used, the corresponding switches must be in the fabric for the command to succeed. Creating a MAC Policy You can create MAC policies to restrict the following management access to the fabric: ■ Access by hosts using SNMP, telnet/sectelnet/SSH, HTTP, or API ■ Access by device ports using Management Server ■ Access through switch serial ports and front panels Secure Fabric OS Version 1.0 User Guide 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129

Creating Secure Fabric OS Policies
59
Secure Fabric OS Version 1.0 User Guide
Note:
If IP addresses are used, you can use “0” in an octet to indicate that any number
can be matched for that octet. For example, 192.168.11.0 would allow access for all IP
devices in the network 192.168.11.
If Domain IDs or switch names are used, the corresponding switches must be in the
fabric for the command to succeed.
Creating a MAC Policy
You can create MAC policies to restrict the following management access to the
fabric:
Access by hosts using SNMP, telnet/sectelnet/SSH, HTTP, or API
Access by device ports using Management Server
Access through switch serial ports and front panels
Table 3:
Valid Methods for Specifying Policy Members
Policy Name
IP
Address
Device
Port
WWN
Switch
WWN
Domain
IDs
Switch
Names
FCS_POLICY
No
No
Yes
Yes
Yes
MAC Policies
No
No
No
No
No
RSNMP_POLICY
Yes
No
No
No
No
WSNMP_POLICY
Yes
No
No
No
No
TELNET_POLICY
Yes
No
No
No
No
HTTP_POLICY
Yes
No
No
No
No
API_POLICY
Yes
No
No
No
No
MS_POLICY
No
Yes
No
No
No
SERIAL_POLICY
No
No
Yes
Yes
Yes
FRONTPANEL_POLICY
No
No
Yes
Yes
Yes
OPTIONS_POLICY
For information about valid input, see “
Creating an
Options Policy
” on page 70.
DCC_POLICY_
nnn
No
Yes
Yes
Yes
Yes
SCC_POLICY
No
No
Yes
Yes
Yes