Fabric OS 6.2 administrator guide 137
For an IPv4 filter policy, the source address has to be a 32-bit IPv4 address in dot decimal notation. The
group prefix has to be a CIDR block prefix representation. For example, 208.130.32.0/24 represents a
24-bit IPv4 prefix starting from the most significant bit. The special prefix 0.0.0.0/0 matches any IPv4
address. In addition, the keyword
any
is supported to represent any IPv4 address.
For an IPv6 filter policy, the source address has to be a 128-bit IPv6 address, in a format acceptable in
RFC 3513. The group prefix has to be a CIDR block prefix representation. For example,
12AB:0:0:CD30::/64 represents a 64-bit IPv6 prefix starting from the most significant bit. In addition, the
keyword
any
is supported to represent any IPv6 address.
For the destination port, a single port number or a port number range can be specified. According to
IANA (
http://www.iana.org
), ports 0 to 1023 are well-known port numbers, ports 1024 to 49151 are
registered port numbers, and ports 49152 to 65535 are dynamic or private port numbers. Well-known and
registered ports are normally used by servers to accept connections, while dynamic port numbers are used
by clients.
For an IP Filter policy rule, you can select port numbers only in either the well-known or the registered port
number range, between 0 and 49151, inclusive. This means that you have the ability to control how to
expose the management services hosted on a switch, but not the ability to affect the management traffic
that is initiated from a switch. A valid port number range is represented by a dash, for example 7–30.
Alternatively, service names can also be used instead of port number.
Table 31
lists the supported service
names and their corresponding port number.
TCP and UDP protocols are valid selections. Fabric OS 5.3.0 and later does not support a configuration to
filter other protocols. Implicitly, ICMP type 0 and type 8 packets are always allowed to support ICMP echo
request and reply on commands like
ping
and
traceroute
. For the action, only
permit
and
deny
are
valid.
For every IP Filter policy, the two rules in
Table 32
are always assumed to be appended implicitly to the
end of the policy. This ensures that TCP and UDP traffic to dynamic port ranges is allowed, so that
management IP traffic initiated from a switch, such as syslog, radius and ftp, is not affected.
Table 31
Supported services
Service name
Port number
http
443
rpcd
897
securerpcd
898
snmp
161
ssh
22
sunrpc
111
telnet
23
www
80
Table 32
Implicit IP Filter rules
Source address
Destination
port
Protocol
Action
Any
1024-65535
TCP
Permit
Any 1024-65535
UDP
Permit
Summary of Contents for A7533A - Brocade 4Gb SAN Switch Base
Page 1: ...HP StorageWorks Fabric OS 6 2 administrator guide Part number 5697 0016 Edition May 2009 ...
Page 24: ...24 ...
Page 99: ...Fabric OS 6 2 administrator guide 99 ...
Page 100: ...100 Managing user accounts ...
Page 118: ...116 Configuring standard security features ...
Page 164: ...162 Configuring advanced security features ...
Page 234: ...232 Installing and maintaining firmware ...
Page 268: ...266 Administering advanced zoning ...
Page 284: ...282 Configuring Enterprise class platforms ...
Page 292: ...290 Routing traffic ...
Page 294: ...292 Interoperability for merged SANs ...
Page 302: ...300 Configuring the Distributed Management Server ...
Page 334: ...332 iSCSI gateway service ...
Page 340: ...338 Administering NPIV ...
Page 407: ...Fabric OS 6 2 administrator guide 405 ...
Page 408: ...406 Using the FC FC routing service ...
Page 438: ...434 Administering extended fabrics ...
Page 460: ...456 Administering ISL trunking ...
Page 516: ...512 FICON fabrics ...
Page 526: ...522 Configuring and monitoring FICON Extension Services ...
Page 540: ...536 Configuring the PID format ...
Page 544: ...540 Understanding legacy password behavior ...
Page 546: ...542 Mixed fabric configurations for non merge SANs ...
Page 550: ...546 Migrating from an MP Router to a 400 MP Router ...
Page 558: ...554 Inband Management ...
Page 572: ...568 ...