Manage Learn to apply best practices and optimize your operations.

How to identify SAN paths and implement access control

How does one analyze all potential SAN access paths and pre-validate SAN configuration changes against SAN access...

policies prior to performing a change so that unauthorized access paths are eliminated, or at least identified? You are asking about how to first identify all SAN paths and then how to implement access control in SAN. This is no different that network security. Establishing SAN access paths will require analyzing the configuration, LUN masking and zoning. Enforcing access control is similar to verifying the authorized access.

Editor's note: Do you agree with this expert's response? If you have more to share, post it in one of our .bphAaR2qhqA^0@/searchstorage>discussion forums.

This was last published in July 2003

Dig Deeper on SAN technology and arrays

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.