3 – PlanningFabric Security3-16 59096-04 AS Common Information Model (CIM): Provides for the management of theswitch through third-party applications that use the Storage ManagementInitiative–Specification (SMI-S). The default is enabled. File Transfer Protocol (FTP): Provides for transferring files rapidly betweenthe workstation and the switch using FTP. The default is enabled. Management Server (MS): Enables or disables the management of theswitch through third-party applications that use GS-3 Management Server.The default is disabled.3.7Fabric SecurityAn effective security profile begins with a security policy that states therequirements. A threat analysis is needed to define the plan of action followed byan implementation that meets the security policy requirements. Internet portals,such as remote access and E-mail, usually present the greatest threats. Fabricsecurity should also be considered in defining the security policy.Most fabrics are located at a single site and are protected by physical security,such as key-code locked computer rooms. For these cases, security methodssuch as user passwords for equipment and zoning for controlling device access,are satisfactory.Fabric security is needed when security policy requirements are more demanding:for example, when fabrics span multiple locations and traditional physicalprotection is insufficient to protect the IT infrastructure. Another benefit of fabricsecurity is that it creates a structure that helps prevent unintended changes to thefabric.Fabric security consists of the following: Connection Security User Account Security Port Binding Device Security