Solved

How to disable TcpForwarding on a Brocade Fibre Channel Switch

Posted on 2010-08-22
6
684 Views
Last Modified: 2013-11-14
Wanting to disable TcpForwarding.

Brocade Silkworm SW3014 Fibre Channel Switch

How to change/edit the /etc/sshd_config file on a

note: already tried vi /etc/sshd_config. no luck
0
Comment
Question by:medfacit
  • 4
6 Comments
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 33498884
What exactly are you trying to achieve? Are you trying to lock down access to the management port?
0
 
LVL 30

Accepted Solution

by:
Duncan Meyers earned 250 total points
ID: 33498974
Having done some research, TCP Forwarding does not appear to be supported by the console of a Brocade switch. It's a TCP/IP function and is not part of the Fibre Channel protocol.
0
 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 250 total points
ID: 33500889
AFAIK Fibre Channel IP address is only used if you want to manage it in-band instead of through the Ethernet port, see http://forums13.itrc.hp.com/service/forums/questionanswer.do?admit=109447627+1282570892759+28353475&threadId=1107111 for example. I've never used it, just left it at thedefault of "none".
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 33506575
You can transport IP across the FC network - NetApp do it for inter-array FC connectivity. It's just a bit weird...
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 33678713
The answer was provided: No - you can't do this. Please split points between myself and andyalder.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now