HP StorageWorks 2/140 embedded web server user guide - Page 47

Configuring Zones, Understanding Zoning, Controlling Access Across a Fabric

Page 47 highlights

3 Configuring Zones Understanding Zoning Designing zoning can be a complex task, especially for multiswitch fabrics. Consult with your managed product vendor's professional services organization before configuring zoning. This section is designed to help you understand the following concepts so that you can more efficiently use Embedded Web Server features to configure and manage zones across a multiswitch fabric: • Benefits of zoning. • How zoning works to control access to storage devices and servers across a fabric. • Other methods of controlling access at the switch and at the server and device, such as binding. • Merging zoned fabrics. • Basic concepts of zoning that you must deal with in configuring zoning such as zones, zone sets, active zones, and default zones. Controlling Access Across a Fabric Embedded Web Server zoning features enable you to establish zoning across a fabric of devices attached to Switches and Directors by partitioning these devices into groups called zones. A zone is comprised of devices that can access each other through port-to-port connections. Devices in the same zone can recognize and communicate with each other; devices in different zones cannot. System administrators create zones to increase security measures and prevent data loss or corruption by controlling access between devices (such as servers and data storage units), or between separate user groups (such as engineering or human resources). embedded web server user guide 3-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178

embedded web server user guide
3–1
3
Configuring Zones
Understanding Zoning
Designing zoning can be a complex task, especially for multiswitch fabrics. Consult
with your managed product vendor’s professional services organization before
configuring zoning.
This section is designed to help you understand the following concepts so that you can
more efficiently use Embedded Web Server features to configure and manage zones
across a multiswitch fabric:
Benefits of zoning.
How zoning works to control access to storage devices and servers across a fabric.
Other methods of controlling access at the switch and at the server and device,
such as binding.
Merging zoned fabrics.
Basic concepts of zoning that you must deal with in configuring zoning such as
zones, zone sets, active zones, and default zones.
Controlling Access Across a Fabric
Embedded Web Server zoning features enable you to establish zoning across a fabric
of devices attached to Switches and Directors by partitioning these devices into groups
called zones. A zone is comprised of devices that can access each other through
port-to-port connections. Devices in the same zone can recognize and communicate
with each other; devices in different zones cannot.
System administrators create zones to increase security measures and prevent data loss
or corruption by controlling access between devices (such as servers and data storage
units), or between separate user groups (such as engineering or human resources).