12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 6: FC Security Best Practicesports remain disabled following a reboot or power off cycle. Otherwise,an attacker could simply cause a power failure on a switch to enablethe unused ports.The next line of defense could be to prevent ports from becomingE_Ports. In the event that an unused port is enabled, a switch wouldstill be unable to join the fabric since the port will not be allowed tobecome an E_Port.The next line of defense could be the creation of an ACL, specifying byWWN and/or switch port which devices are allowed to join the fabric.In <strong>Brocade</strong> fabrics, ACLs are used to control device access to a fabric:• The Switch Connection Control (SCC) policy is used to specify theWWN of the switches allowed to join the fabric.• The Device Connection Control (DCC) policy is used to specifywhich hosts and storage devices are allowed to join the fabric. TheDCC policy can specify members by WWN but it can also lockdown a WWN to a physical port on a switch so that only a specificWWN can connect to a specific port in the fabric, and all otherdevices connecting to that port will not be authorized. This couldbe considered a WWN anti-spoofing countermeasure.The <strong>Brocade</strong> DCC and SCC policies are also known as fabric-wide consistencypolicies, since they can be distributed throughout an entirefabric and used in two different modes:• In strict mode, all devices participating in the fabric must bedefined in the DCC or SCC policy.• The tolerant mode allows some switches to join the fabric withoutrequiring them to be defined in the ACL. This is useful when thefabric contains switches running older versions of firmware (priorto FOS 5.2.0), which cannot use the FOS DCC and SCC policies.As a best practice, it is advisable to use the strict policy as much aspossible. A fabric is only as secure as its weakest link, and if oneswitch does not participate in an SCC policy then that would be theweak link and easiest target for an attacker.The final and most sophisticated line of defense to prevent deviceaccess is to use a device authentication mechanism. The ANSI T11standard FC-SP (FC security protocol) defines the DH-CHAP protocol forthis purpose. Devices supporting DH-CHAP can be configured with ashared secret between the device and the switch, and only the devicewith the corresponding shared secret will be allowed to join the fabric.(see “Diffie-Hellman” on page 84). On <strong>Brocade</strong> FC switches, Fibre96 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!