SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Son of SAN - Storage Networking Technologies -- Ignore unavailable to you. Want to Upgrade?


To: Douglas Nordgren who wrote (1071)2/15/1999 8:21:00 PM
From: Douglas Nordgren  Read Replies (4) | Respond to of 4808
 
Security in the SAN - Zoning

Zoning separates a Fabric into multiple sub fabrics to control access to devices in the fabric. The sub fabrics can be organized geographically or logically.

Zoning supports Security Policies, enables sharing of Physical Resources, segregates Users, and protects against malicious and accidental attacks and operating anomalies (i.e. idiot operators).

Virtual Zoning (software zoning) -
Sets up cooperation between initiators (servers) and the fabric
Initiators follow device discovery protocol
Name Space & Driver compliant architecture
Fabric offers name server, and targets register or fabric discovers
Management intervention defines zones
Fabric name space "hides" devices outside of zone
No routing enforcement in fabric
Zones can overlap
Based on port number or world-wide name
Does not protect against malicious or accidental attack

Hard Zoning (hardware zoning) -
Hardware access control at port level
Hardware enforced port-based routing
Hardware enforced path selection
Zones can not overlap
Fabric enforces routing
Rigid enforcement by hardware
Protects against malicious and accidental attacks
Prevents exploratory and denial of service attacks