12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The <strong>Brocade</strong> SAN Security ModelData path availability. Redundant data paths between the host andstorage devices are part of a dual-fabric architecture. Dual-attachedhosts using MultiPathing I/O (MPIO) software can load-balance trafficbetween the two paths or they can fail over to a single path in theevent of the failure of one path.Data path redundancy can also be built into a fabric, using resilientfabrics or other architectures that provide path redundancy as discussedin “Chapter 3: SAN Basics for Security Professionals” startingon page 19. Some SAN designers simply use dual ISLs for redundancybetween the switches instead of using single ISLs.Data center availability. The data center itself can be an SPOF in theevent of a natural or man-made disaster such as an earthquake, fire,or massive local power failure. This problem is addressed with multipledata centers maintaining replicated copies of data between them.Fabrics in one data center can be mirrored in a second data center tocreate a “hot” site, which can be used to fail over all activity from theprimary data center to the secondary. Exchanging data between thedata centers can be done using dark fiber (depending on the distanceand cost) or using the FCIP protocol over a public or private WAN.SAN Availability Best Practices Summary• Use switches with redundant, hot-swappable components orenterprise-class platforms (<strong>Brocade</strong> 48000, DCX, DCX-4S) forgreater hardware availability• Deploy disk-based SANs using a dual-fabric architecture• Install fabric A and fabric B of a dual fabric in separate racks• Use redundant data paths in the fabric design• Use secondary data centers for Disaster Recovery (DR) andBusiness Continuity (BC)Logging and MonitoringThe ability to track activity in a SAN certainly does not prevent attacksbut it may act as a deterrent when it is known this is being done. Logscan be used to detect intrusions and provide evidence in legal prosecutionof unauthorized users, as well as simplifying thetroubleshooting process.Securing Fibre Channel Fabrics 105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!