HP StorageWorks XP Command View Advanced Edition Software 6.4 Server Administrator Guide for Device Manager and Provisioning Manager (web) (T1780-96341, July 2010)

Table Of Contents
Overview
14
actually act as the gateway between the production LAN and the management LAN, and there is no
additional firewall, you must be very sure that the server itself will not route traffic between the two
networks.
This configuration is the third most secure, and is more flexible than either the most or second-most
secure configurations. While it protects the devices under management, it does not protect the
management application servers themselves. Therefore, all management application servers should
be hardened to the maximum possible extent. Additionally, because the management application
servers themselves act as gateways between the two LANs, OS hardening is more important.
CAUTION: When Physical View of XP24000/XP20000 or XP12000/XP10000/SVS200, or XP
Remote Web Console of XP1024/XP128 is launched, Java Web Start and the web browser on the
web client computer directly communicate with the storage subsystem. For this reason, if the web
client computer and the storage subsystem exist on different networks, you must set up the
networks so that the computer and the storage subsystem can directly communicate with each
other.
The following figure illustrates dual-homed management servers plus a separate management LAN.
Figure 1-5 Third-most secure configuration: dual-homed management servers plus separate
management LAN
1-2-5 Least secure configuration: flat network
Here, the management application servers, managed devices, and managed clients all coexist on
the same network.
This configuration is the least secure, though it is the most flexible. It affords no protection to any of
the components required for storage management operations, so management application server
hardening is paramount. Additionally, you need to consider updating the microcode of devices under
management, especially if they are related in any way to security for the device management
controllers themselves.