DCC policy restrictions
..............................................................................................................................................................................................................................
222
Creating a DCC policy
...............................................................................................................................................................................................................................
223
Deleting a DCC policy
...............................................................................................................................................................................................................................
224
DCC policy behavior with Fabric-Assigned PWWNs
..............................................................................................................................................................
224
SCC Policies
..............................................................................................................................................................................................................................................................
226
Virtual Fabrics considerations for SCC policies
.........................................................................................................................................................................
226
Creating an SCC policy
.............................................................................................................................................................................................................................
226
Authentication policy for fabric elements
..................................................................................................................................................................................................
227
Virtual Fabrics considerations
..............................................................................................................................................................................................................
228
E_Port authentication
................................................................................................................................................................................................................................
228
Device authentication policy
..................................................................................................................................................................................................................
230
AUTH policy restrictions
..........................................................................................................................................................................................................................
230
Authentication protocols
............................................................................................................................................................................................................................
231
Secret key pairs for DH-CHAP
............................................................................................................................................................................................................
232
FCAP configuration overview
...............................................................................................................................................................................................................
233
Fabric-wide distribution of the authorization policy
..................................................................................................................................................................
236
IP Filter policy
...........................................................................................................................................................................................................................................................
236
Virtual Fabrics considerations for IP Filter policy
.....................................................................................................................................................................
236
Creating an IP Filter policy
......................................................................................................................................................................................................................
236
Cloning an IP Filter policy
........................................................................................................................................................................................................................
236
Displaying an IP Filter policy
..................................................................................................................................................................................................................
237
Saving an IP Filter policy
..........................................................................................................................................................................................................................
237
Activating an IP Filter policy
...................................................................................................................................................................................................................
237
Deleting an IP Filter policy
.......................................................................................................................................................................................................................
237
IP Filter policy rules
.....................................................................................................................................................................................................................................
238
IP Filter policy enforcement
...................................................................................................................................................................................................................
240
Adding a rule to an IP Filter policy
.......................................................................................................................................................................................................
241
Deleting a rule from an IP Filter policy
...............................................................................................................................................................................................
241
Aborting an IP Filter transaction
............................................................................................................................................................................................................
241
IP Filter policy distribution
.........................................................................................................................................................................................................................
241
Policy database distribution
..............................................................................................................................................................................................................................
242
Database distribution settings
...............................................................................................................................................................................................................
243
ACL policy distribution to other switches
.......................................................................................................................................................................................
244
Fabric-wide enforcement
.........................................................................................................................................................................................................................
244
Notes on joining a switch to the fabric
.............................................................................................................................................................................................
245
Management interface security
.......................................................................................................................................................................................................................
247
Configuration examples
............................................................................................................................................................................................................................
248
IPsec protocols
..............................................................................................................................................................................................................................................
249
Security associations
..................................................................................................................................................................................................................................
250
Authentication and encryption algorithms
.....................................................................................................................................................................................
250
IPsec policies
....................................................................................................................................................................................................................................................
251
IKE policies
.........................................................................................................................................................................................................................................................
251
Creating the tunnel
.......................................................................................................................................................................................................................................
252
Example of an end-to-end transport tunnel mode
...................................................................................................................................................................
254
Maintaining the Switch Configuration File
..........................................................................................................................................................................................................
257
Configuration settings
..........................................................................................................................................................................................................................................
257
Configuration file format
.........................................................................................................................................................................................................................
258
Configuration file backup
...................................................................................................................................................................................................................................
259
Considerations for FTP server credentials with special characters
.................................................................................................................................
259
Uploading a configuration file in interactive mode
......................................................................................................................................................................
261
Brocade Fabric OS Administration Guide, 8.0.1
53-1004111-02
9