Solved

How to disable TcpForwarding on a Brocade Fibre Channel Switch

Posted on 2010-08-22
6
698 Views
Last Modified: 2013-11-14
Wanting to disable TcpForwarding.

Brocade Silkworm SW3014 Fibre Channel Switch

How to change/edit the /etc/sshd_config file on a

note: already tried vi /etc/sshd_config. no luck
0
Comment
Question by:medfacit
  • 4
6 Comments
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 33498884
What exactly are you trying to achieve? Are you trying to lock down access to the management port?
0
 
LVL 30

Accepted Solution

by:
Duncan Meyers earned 250 total points
ID: 33498974
Having done some research, TCP Forwarding does not appear to be supported by the console of a Brocade switch. It's a TCP/IP function and is not part of the Fibre Channel protocol.
0
 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 250 total points
ID: 33500889
AFAIK Fibre Channel IP address is only used if you want to manage it in-band instead of through the Ethernet port, see http://forums13.itrc.hp.com/service/forums/questionanswer.do?admit=109447627+1282570892759+28353475&threadId=1107111 for example. I've never used it, just left it at thedefault of "none".
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 33506575
You can transport IP across the FC network - NetApp do it for inter-array FC connectivity. It's just a bit weird...
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 33678713
The answer was provided: No - you can't do this. Please split points between myself and andyalder.
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise Password Manager Suites as well as Local Password managers are covered in this article.
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question