C H A P T E R
20-1
Cisco MDS 9000 Fabric Manager Switch Configuration Guide
OL-7753-01
20
Configuring Port Security
All switches in the Cisco MDS 9000 Family provide port security features that rejects intrusion attempts
and reports these intrusions to the administrator.
Note
Port security is only supported for Fibre Channel ports.
This chapter contains the following topics:
•
Port Security Features, page 20-1
•
About Auto-Learn, page 20-3
•
Manually Configuring Port Security, page 20-7
•
Database Scenarios, page 20-8
•
Displaying Port Security Statistics, page 20-9
•
Displaying Port Security Violations, page 20-9
•
Default Port Security Settings, page 20-9
Port Security Features
Typically, any Fibre Channel device in a SAN can attach to any SAN switch port and access SAN
services based on zone membership. Port security features prevent unauthorized access to a switch port
in the Cisco MDS 9000 Family:
•
Login requests from unauthorized Fibre Channel devices (Nx ports) and switches (xE ports) are
rejected.
•
All intrusion attempts are reported to the SAN administrator through syslog messages.
Enforcing Port Security
To enforce port security, configure the devices and switch port interfaces through which each device or
switch is connected.
•
Use the port world wide name (pWWN) or the node world wide name (nWWN) to specify the Nx
port connection for each device.
•
Use the switch world wide name (sWWN) to specify the xE port connection for each switch.