Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
Zoning can be implemented either by switch port to block access to un-authorized ports where a name-based zone restricts by world wide name (WWN). Use WWN zones if you need to move devices, for example tape drives, to other locations in a fabric. For stronger security, port zones can be used if you can trust what is attached to the port, however avoid WWN spoofing. Refer to vendor (Brocade, Qlogic, Cisco, McData) documentation and their recommendations on zoning, their specific implementation and interoperability.
This was first published in January 2007