Brocade Fabric Watch Administrator's Guide v6.1.0 (53-1000601-02, June 2008)
Fabric Watch Administrator’s Guide 81
53-1000601-02
DRAFT: BROCADE CONFIDENTIAL
Appendix
D
Port fencing types
Table 28 lists and describes the set of port fencing types that are available in M-EOS and FOS 6.1.
TABLE 28 Port fencing types
Fencing Type Violation Subtype Description Firmware Class / Area FOS Support
Security Port Binding The login server detects a
Port Binding violation when
an attached device
attempts to FLOGI with a
port name WWN that does
not match the WWN in the
Port Binding configuration
for that F_Port.
Security/DCC
violations
DCC check disables the
port on failure, so no
additional port fencing is
required.
Security Switch Binding The login server detects a
Switch Binding violation
when an attached device
attempts to FLOGI with a
port name that is not
contained in the Switch
Membership list.
Security/DCC
violations
DCC check disables the
port on failure, so no
additional port fencing is
required.
Security Authentication Authentication violations
are detected by the
Authentication Services
subsystem (the Radius
feature) during an
authentication protocol
session initiated
immediately after an E_Port
or F_Port login.
Security/SLAP failures DH-CHAP / FCAP por t will be
segmented/disabled on
Auth failures, so no
additional port fencing is
required.
Security N_Port connection Not
Allowed
When a device attempts to
log into a port not
configured for N_Port
support, the Login server
detects an N_Port
Connection Not Allowed
violation.
Not supported FOS has locked L_Port,
disabled E_Port, and locked
G_Port. These do not fall in
“Not configured for N_Port”
category.
Link Level (hot I/O) Link Transition Threshold
Exceeded
Repeated link transitions
between Active and Inactive
state caused by bad cables,
driver defects, and
hardware device protocol
errors.
Port/Link Loss Implemented in FOS 6.1.
Protocol ISL Fencing An E_Port is bouncing due
to a loss of light/signal link
bouncing.
E_Port/Link loss Implemented in FOS 6.1