Download FICON Planning and Implementation Guide
Transcript
The management differences between the two protocols are not relevant unless you want to control the scope of the switching through zoning or connectivity control. For example, FCP devices use name server zoning as a way to provide fabric-wide connection control. FICON devices can use the Prohibit Dynamic Connectivity Mask (PDCM) to provide Director-wide connection control. The PDCM is a vector-defined addressing system that establishes which addresses are allowed to communicate with each other. The FICON Director is required to support hardware enforcement of the connectivity control. In intermix environments, this is more restrictive than the zoning information used by open systems devices. It is also important to understand the implications of FICON port addressing versus port numbering in FCP. FICON abstracts the concept of the port by creating an object known as the port address. An association is then made between the port address and the port number. This concept facilitates the ability to perform FICON port swaps for maintenance operations without the need to regenerate the host configuration. The port address abstraction is not in the Fibre Channel architecture and is foreign to FCP. FCP communications are name-centric, discovery-oriented, and fabric-assigned, and they use the Fibre Channel Name Server to determine device communication. When an FCP device attaches to the fabric, it queries the Name Server for the zoning information. FICON devices do not query because the allowable port and device relationships have been previously defined. FCP configurations support multiple fabrics and allow seven hops between source and target. FCP port-to-port connectivity has traditionally been enforced through zoning, although other techniques complementary to zoning (such as port, Director, and fabric binding) are used. Binding helps alleviate the security concerns that are experienced in intermix installations, because with FCP, any device in the fabric can access the ANSI standard FC management server by logging into the fabric. If you are implementing intermix, you must block the transfer of any and all frames from a FICON Director port to all SAN connected ports and vice versa. For more detailed information about these topics, refer to: Implementing an IBM b-type SAN with 8 Gbps Directors and Switches, SG24-6116 IBM/Cisco Multiprotocol Routing: An Introduction and Implementation, SG24-7543 IBM System Storage b-type Multiprotocol Routing: An Introduction and Implementation, SG24-7544 Implementing an IBM/Cisco SAN, SG24-7545 4.6.2 Fabric security Best security practices typically address three main objectives: availability and destruction, confidentiality and disclosure, and integrity and alteration of data. However, it is important to remember that the majority of security threats are from insiders. Therefore, any SAN security strategy must also include: Restrict administrator privileges Isolate sensitive environments Audit SAN activities All-level documentation Chapter 4. Planning the FICON environment 91