350 Administering Advanced Zoning
Figure 24
Hardware-enforced overlapping zones
Any zone using both WWNs and
domain, port
entries on the 2 Gbit/sec platform relies on Name Server
authentication as well as hardware-assisted (ASIC) authentication, which ensures that any
PLOGI/ADISC/PDISC/ACC from an unauthorized device attempting to access a device it is not zoned
with is rejected. 2 Gbit/sec switches always deploy the hardware assist, in any zone configuration (see
Figure 25
and
Figure 26
).
Figure 25
Zoning with hardware assist (mixed-port and WWN zones)
Figure 26
Session-based hard Zoning
In
Figure 26
, only the ports that are overlapped are software-enforced with hardware assist.
Port_Zone1
Core
Switch
Zone Boundaries
WWN_Zone1
Port_Zone2
WWN_Zone2
22.3b(13.3)
Port_WWN
Zone1
Core
Switch
Zone Boundaries
Port_WWN
Zone3
Port_WWN
Zone2
Port_WWN
Zone4
22.4b(13.4)
Port_Zone1
Core
Switch
Zone Boundaries
Port_Zone2
WWN_Zone1
WWN_Zone2
22.5b(13.5)
Summary of Contents for AE370A - Brocade 4Gb SAN Switch 4/12
Page 18: ...18 ...
Page 82: ...82 Managing user accounts ...
Page 102: ...102 Configuring standard security features ...
Page 126: ...126 Maintaining configurations ...
Page 198: ...198 Routing traffic ...
Page 238: ...238 Using the FC FC routing service ...
Page 260: ...260 Administering FICON fabrics ...
Page 280: ...280 Working with diagnostic features ...
Page 332: ...332 Administering Extended Fabrics ...
Page 414: ...398 Configuring the PID format ...
Page 420: ...404 Configuring interoperability mode ...
Page 426: ...410 Understanding legacy password behaviour ...
Page 442: ...426 ...
Page 444: ......
Page 447: ......