Cisco DS-C9216I-K9 Switch Guide - Page 51

Fabric Management, Security Management, Switch Access Security, Port Security

Page 51 highlights

Chapter 1 Product Overview Software Features When a switch powers up and two supervisor modules are present, the module in slot 5 enters the active mode, while the second module in slot 6 enters the standby mode. All storage management functions occur on the active supervisor module. The standby module constantly monitors the active module. If the active module fails, the standby module takes over without any impact to user traffic. See the Cisco MDS 9500 Series Hardware Installation Guide for additional information. Fabric Management Switches in the Cisco MDS 9000 Family offer fabric management and control through the command-line interface (CLI) by using Telnet, SSH, or a serial console and through the Cisco MDS 9000 Fabric Manager tool by using the Simple Network Management Protocol (SNMP) services: • SNMP versions 1, 2, and 3 are supported. • Remote Monitoring (RMON) allows you to specify thresholds and monitor alarms on SNMP variables. Extended RMON alarms are available for supported Management Information Base (MIB) objects. See the Cisco MDS 9000 Family MIB Reference Guide for additional information. • System error message logs (syslogs) are viewed through a console or Telnet session for asynchronous events such as an interface transition. Syslogs are directed to an internal log and optionally to an external server. See the Cisco MDS 9000 Family System Messages Guide for additional information. Security Management The Cisco MDS 9000 Family of switches offer strict and secure switch management options through switch access security, port security, user authentication, and role-based access. Switch Access Security Each switch can be accessed through the CLI or SNMP. • Secure switch access-Available when you explicitly enable Secure Shell (SSH) access to the switch. SSH access provides additional controlled security by encrypting data, user IDs, and passwords. By default, Telnet access is enabled on each switch. • SNMP access-SNMPv3 provides built-in security for secure user authentication and data encryption. • IP Access control lists (IP-ACLs)-Provide basic network security to all switches in the Cisco MDS 9000 Family. IP-ACLs restricts IP-related inband and out-of-band management traffic based on IP addresses (layer 3 and layer 4 information). You can use IP-ACLs to control transmissions on an interface. Port Security Port security features prevent unauthorized access to a switch port in the Cisco MDS 9000 Family. • Login requests from unauthorized Fibre Channel devices (Nx ports) and switches (xE ports) are rejected. • All intrusion attempts are reported to the SAN administrator through syslog messages. OL-7753-01 Cisco MDS 9000 Fabric Manager Switch Configuration Guide 1-9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436

1-9
Cisco MDS 9000 Fabric Manager Switch Configuration Guide
OL-7753-01
Chapter 1
Product Overview
Software Features
When a switch powers up and two supervisor modules are present, the module in slot 5 enters the active
mode, while the second module in slot 6 enters the standby mode. All storage management functions
occur on the active supervisor module. The standby module constantly monitors the active module. If
the active module fails, the standby module takes over without any impact to user traffic.
See the
Cisco MDS 9500 Series Hardware Installation Guide
for additional information.
Fabric Management
Switches in the Cisco MDS 9000 Family offer fabric management and control through the command-line
interface (CLI) by using Telnet, SSH, or a serial console and through the Cisco MDS 9000 Fabric
Manager tool by using the Simple Network Management Protocol (SNMP) services:
SNMP versions 1, 2, and 3 are supported.
Remote Monitoring (RMON) allows you to specify thresholds and monitor alarms on SNMP
variables. Extended RMON alarms are available for supported Management Information Base
(MIB) objects. See the
Cisco MDS 9000 Family MIB Reference Guide
for additional information.
System error message logs (syslogs) are viewed through a console or Telnet session for
asynchronous events such as an interface transition. Syslogs are directed to an internal log and
optionally to an external server. See the
Cisco MDS 9000 Family System Messages Guide
for
additional information.
Security Management
The Cisco MDS 9000 Family of switches offer strict and secure switch management options through
switch access security, port security, user authentication, and role-based access.
Switch Access Security
Each switch can be accessed through the CLI or SNMP.
Secure switch access—Available when you explicitly enable Secure Shell (SSH) access to the
switch. SSH access provides additional controlled security by encrypting data, user IDs, and
passwords. By default, Telnet access is enabled on each switch.
SNMP access—SNMPv3 provides built-in security for secure user authentication and data
encryption.
IP Access control lists (IP-ACLs)—Provide basic network security to all switches in the Cisco MDS
9000 Family. IP-ACLs restricts IP-related inband and out-of-band management traffic based on IP
addresses (layer 3 and layer 4 information). You can use IP-ACLs to control transmissions on an
interface.
Port Security
Port security features prevent unauthorized access to a switch port in the Cisco MDS 9000 Family.
Login requests from unauthorized Fibre Channel devices (Nx ports) and switches (xE ports) are
rejected.
All intrusion attempts are reported to the SAN administrator through syslog messages.