12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SAN SecurityFigure 14. Creating secure device connectivity via port bindingPort binding thus locks in the authorized connection between the fabricand the device, ensuring that the link between the device and thefabric is secure. This mechanism prevents both deliberate and inadvertentchanges in connectivity that might allow an unauthorizedserver or workstation to gain access to storage data.Fabric BindingAt a higher level, it may also be desirable to secure connectionsbetween multiple fabric switches. Fibre Channel fabric switches aredesigned to automatically extend the fabric as new switches are introduced.When two fabric switches are connected via ISLs, theyautomatically exchange fabric-building protocols, zoning in<strong>for</strong>mation,and routing tables. While this is acceptable in some environments, itcreates a security concern. Someone wishing to probe the fabric couldsimply attach an additional switch and use it to gain entrance into theSAN.<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong> 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!