26.12.2014 Views

Fabric Manager Users Guide, Version 6.1, Revision A - QLogic

Fabric Manager Users Guide, Version 6.1, Revision A - QLogic

Fabric Manager Users Guide, Version 6.1, Revision A - QLogic

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4–Virtual <strong>Fabric</strong>s<br />

Configuration<br />

The layout is as follows:<br />

<br />

<br />

<br />

<br />

<br />

Each Virtual<strong>Fabric</strong> contain the following:<br />

• One or more groups of devices<br />

• One or more sets of Applications<br />

• Administrator policies<br />

The v<strong>Fabric</strong>s control the security configuration for the given set of devices and<br />

applications in the overall fabric.<br />

Each Virtual<strong>Fabric</strong> section can have one or more Applications and<br />

DeviceGroups sections. Both the devices and the applications are matched<br />

against PathRecord and Multicast SA queries. The returned SLID/DLID, PKey,<br />

SL, and so on, are appropriate for the v<strong>Fabric</strong> that contain the involved devices<br />

and applications.<br />

Device Membership and Security<br />

Devices are specified by the devicegroup name in the following ways in the<br />

Virtual<strong>Fabric</strong> section:<br />

• As Full Members:<br />

group_name<br />

Such devices may talk to any other Member or LimitedMember.<br />

• As Limited Members:<br />

group_name<br />

When Security is 1 (On), LimitedMembers are not permitted to talk to other<br />

LimitedMembers. However, LimitedMembers can always talk to Members.<br />

LimitedMembers cannot join multicast groups in the v<strong>Fabric</strong>.<br />

When security is on for a v<strong>Fabric</strong>, PKeys and switch hardware enforcement is<br />

used to secure the v<strong>Fabric</strong> and enforce the Members and LimitedMembers rule.<br />

Security also ensures that devices in other v<strong>Fabric</strong>s cannot talk to devices in the<br />

given v<strong>Fabric</strong>. This security includes, hardware enforced per-packet PKey<br />

checking, and enforcement by switches and end nodes.<br />

IB0054608-01 B 4-17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!