|
manual abstract
• RBAC Phase I: Enhanced User Rights Configuration—RBAC is role based access
control. This is the first phase of more comprehensive role-based access control
planned for the CLI and EWS interfaces. Multiple users can now be configured
for EWS or CLI, or both, through either interface. This allows users to configure
additional user name/password combinations.
• SSH for CLI—Secure Shell (SSH) provides an encrypted connection, as an
alternative to Telnet, to secure CLI access to switches and directors.
• Enhanced Maintenance Port Security—This allows users to enable enhanced
authorization on the maintenance port, which is the switch or director RS-232
connection. Enhanced Authorization mode enforces stronger security policies,
requiring users to change the well-known password to a case- sensitive private
password the first time they use the maintenance port. Subsequent access by
service personnel requires log in through the private customer-level access.
• Security Log—The Security Log is a new log available in EWS, CLI, and HAFM
that records various events concerning the integrity of a switch. This includes
authorization or authentication problem detection, and approved and invalid
access attempts. Each log entry provides an event number or reason, a date/time
stamp, a trigger level (a type of security event severity), an event count, and a
category and data pertaining to the specific event. The log wraps at 200 entries.
This log provides customers with details to track down attempted security threats
and identify the source of problems that might jeopardize the switch integrity.
• IP Access Control List—This allows users to establish a list of IP addresses from
which the switch is allowed to accept connections. This prevents users who
have access to the Ethernet LAN from attempting to access the Fibre Channel
switches. Connection at empts from unauthorized IP addresses are ignored by
the switch, making it appear that no device is connected. This is primarily
intended for environments that are not on a private, inaccessible subnet, such as
when installed in most cabinet configurations with a dual-NIC HAFM appliance
processor.
Advanced Fabric Diagnostics
This provides tools to monitor the fabric and identify potential problems before
they impact network and application performance. Tools include ISL Fencing, new
switch-centric Fabric and Embedded Port Logs, an Audit Log for the embedded user
interfaces, and access to the Digital Diagnostic capabilities included with newer SFP
transceivers.
ISL Fencing
Also called Port Fencing, this feature allows customers to set up policies for blocking
an ISL when problems occur that cause an ISL to “bounce” or repeatedly attempt to
establish a connection. Any time an ISL is brought up or down, a fabric rebuild occurs,
which can cause disruption in some environments. ISL Fencing wil lessen the likelihood
of having a problematic ISL connection disrupt a SAN.
Director release notes
15
...Other models in this manual:
Media Storage - HP StorageWorks Director 2/64 base 32 port config (442.44 kb)
Media Storage - HP StorageWorks Director 2/140 (442.44 kb)