HP StorageWorks MSA 2/8 HP StorageWorks Secure Fabric OS V1.0 User Guide (AA-R - Page 67

Serial Port Policy, Table 9: Serial Port Policy States, Saving Changes to, Secure Fabric OS Policies

Page 67 highlights

Creating Secure Fabric OS Policies 3. To save or activate the new policy, enter the secpolicysave or the secpolicyactivate command. If neither of these commands are entered, the changes are lost when you log out. For more information about these commands, see "Saving Changes to Secure Fabric OS Policies" on page 77 and "Activating Changes to Secure Fabric OS Policies" on page 77. Example, creating an MS_POLICY that allows access through a device that has a WWN of 12:24:45:10:0a:67:00:40: primaryfcs:admin> secPolicyCreate "MS_POLICY", "12:24:45:10:0a:67:00:40" MS_POLICY has been created. primaryfcs:admin> Serial Port Policy You can create the Serial Port policy to restrict serial port access to switches that are physically secure. The policy is named SERIAL_POLICY and contains a list of switch WWNs, Domain IDs, or switch names for which serial port access is enabled. The Serial Port policy is checked before the account login is allowed. If the Serial Port policy exists and the switch is not included in the policy, the session is terminated. The possible Serial Port policy states are shown in Table 9. Table 9: Serial Port Policy States Policy State No policy Policy with no entries Policy with entries Characteristics All serial ports of the switches in the fabric are enabled. All serial ports of the switches in the fabric are disabled. Only specified switches can be accessed through the serial ports. Secure Fabric OS Version 1.0 User Guide 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129

Creating Secure Fabric OS Policies
67
Secure Fabric OS Version 1.0 User Guide
3.
To save or activate the new policy, enter the
secpolicysave
or the
secpolicyactivate
command.
If neither of these commands are entered, the changes are lost when you log
out. For more information about these commands, see “
Saving Changes to
Secure Fabric OS Policies
” on page 77 and “
Activating Changes to Secure
Fabric OS Policies
” on page 77.
Example, creating an MS_POLICY that allows access through a device that
has a WWN of 12:24:45:10:0a:67:00:40:
Serial Port Policy
You can create the Serial Port policy to restrict serial port access to switches that
are physically secure. The policy is named SERIAL_POLICY and contains a list
of switch WWNs, Domain IDs, or switch names for which serial port access is
enabled.
The Serial Port policy is checked before the account login is allowed. If the Serial
Port policy exists and the switch is not included in the policy, the session is
terminated.
The possible Serial Port policy states are shown in
Table 9
.
primaryfcs:admin> secPolicyCreate "MS_POLICY", "12:24:45:10:0a:67:00:40"
MS_POLICY has been created.
primaryfcs:admin>
Table 9:
Serial Port Policy States
Policy State
Characteristics
No policy
All serial ports of the switches in the fabric are enabled.
Policy with no entries
All serial ports of the switches in the fabric are disabled.
Policy with entries
Only specified switches can be accessed through the serial
ports.