HP StorageWorks 2/140 fw 05.01.00 and sw 07.01.00 ha-fabric manager user guide - Page 132

Controlling Access Across a Fabric, confidential data from unauthorized access.

Page 132 highlights

Fabric Zoning Controlling Access Across a Fabric The fabric zoning feature enables you to partition devices attached to managed Fibre Channel products into groups called zones. A zone contains devices that can access one another through port-to-port connections. Devices in the same zone can recognize and communicate with one another; devices in different zones cannot. System administrators create zones to increase security measures and prevent data loss or corruption by controlling access between devices (such as servers and data storage units), or between separate user groups (such as engineering or human resources). Zoning allows an administrator to: ■ Establish barriers between devices that use different operating systems. For example, it is often critical to separate servers and storage devices with different operating systems because accidental transfer of information from one to another can delete or corrupt data. Zoning prevents this accidental transfer of information by grouping devices that use the same operating systems into zones. ■ Create logical subsets of closed user groups. Administrators can authorize access rights to specific zones for specific user groups, thereby protecting confidential data from unauthorized access. ■ Create groups of devices that are separate from devices in the rest of a fabric. Zoning allows certain processes (such as maintenance or testing) to be performed on devices in one group without interrupting devices in other groups. ■ Allow temporary access between devices for specific purposes. Administrators can remove zoning restrictions temporarily (for example, to perform nightly data backup), then restore zoning restrictions to return to normal processes. 132 High Availability Fabric Manager User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244

Fabric Zoning
132
High Availability Fabric Manager User Guide
Controlling Access Across a Fabric
The fabric zoning feature enables you to partition devices attached to managed
Fibre Channel products into groups called zones. A zone contains devices that can
access one another through port-to-port connections. Devices in the same zone
can recognize and communicate with one another; devices in different zones
cannot.
System administrators create zones to increase security measures and prevent data
loss or corruption by controlling access between devices (such as servers and data
storage units), or between separate user groups (such as engineering or human
resources). Zoning allows an administrator to:
Establish barriers between devices that use different operating systems. For
example, it is often critical to separate servers and storage devices with
different operating systems because accidental transfer of information from
one to another can delete or corrupt data. Zoning prevents this accidental
transfer of information by grouping devices that use the same operating
systems into zones.
Create logical subsets of closed user groups. Administrators can authorize
access rights to specific zones for specific user groups, thereby protecting
confidential data from unauthorized access.
Create groups of devices that are separate from devices in the rest of a fabric.
Zoning allows certain processes (such as maintenance or testing) to be
performed on devices in one group without interrupting devices in other
groups.
Allow temporary access between devices for specific purposes.
Administrators can remove zoning restrictions temporarily (for example, to
perform nightly data backup), then restore zoning restrictions to return to
normal processes.