beautypg.com

Security violations – Brocade Monitoring and Alerting Policy Suite Administrators Guide (Supporting Fabric OS v7.3.0) User Manual

Page 28

background image

The following table below lists the monitored parameters in this category. Possible states for all FRU
measures are faulty, inserted, on, off, ready, and up.

FRU Health category parameters

TABLE 7

Monitored parameter

Description

Power Supplies
(PS_STATE)

State of a power supply has changed.

Fans (FAN_STATE)

State of a fan has changed.

Blades (BLADE_STATE)

State of a slot has changed.

SFPs (SFP_STATE)

State of the SFP transceiver has changed.

WWN (WWN_STATE)

State of a WWN card has changed.

Security Violations

The Security Violations category monitors different security violations on the switch and takes action
based on the configured thresholds and their actions.

The following table lists the monitored parameters in this category.

Security Violations category parameters

TABLE 8

Monitored parameter

Description

DCC violations (SEC_DCC)

An unauthorized device attempts to log in to a secure fabric.

HTTP violations (SEC_HTTP) A browser access request reaches a secure switch from an unauthorized IP

address.

Illegal command (SEC_CMD) Commands permitted only to the primary Fibre Channel Switch (FCS) are

executed on another switch.

Incompatible security DB
(SEC_IDB)

Secure switches with different version stamps have been detected.

Login violations (SEC_LV)

Login violations which occur when a secure fabric detects a login failure.

Invalid Certifications
(SEC_CERT)

Certificates are not valid.

No-FCS (SEC_FCS)

The switch has lost contact with the primary FCS.

SCC violations (SEC_SCC)

SCC violations which occur when an unauthorized switch tries to join a secure
fabric. The WWN of the unauthorized switch appears in the ERRLOG.

SLAP failures
(SEC_AUTH_FAIL)

SLAP failures which occur when packets try to pass from a non-secure switch to a
secure fabric.

Telnet violations
(SEC_TELNET)

Telnet violations which occur when a Telnet connection request reaches a secure
switch from an unauthorized IP address.

Security Violations

28

Monitoring and Alerting Policy Suite Administrator's Guide

53-1003147-01