Refer to the exhibit.
An engineer must strictly enforce the port security configuration database in the Fibre Channel fabric. A new device has been connected to the Fibre Channel storage interface that was configured for port security. The port security was enabled for the VSAN that the port belongs to. Despite the configuration, the rogue devices can log into the fabric. Which action resolves the issue?
Currently there are no comments in this discussion, be the first to comment!