US 11,729,116 B2
Violation detection and isolation of endpoint devices in soft zoning environment
Ramesh Kumar Subbiah, Chennai (IN); and Vibin Varghese, Chennai (IN)
Assigned to DELL PRODUCTS L.P., Round Rock, TX (US)
Filed by DELL PRODUCTS L.P., Round Rock, TX (US)
Filed on Mar. 10, 2020, as Appl. No. 16/814,089.
Prior Publication US 2021/0288923 A1, Sep. 16, 2021
Int. Cl. H04L 49/356 (2022.01); H04L 43/022 (2022.01); H04L 47/2483 (2022.01); H04L 9/40 (2022.01)
CPC H04L 49/357 (2013.01) [H04L 43/022 (2013.01); H04L 47/2483 (2013.01); H04L 63/101 (2013.01); H04L 63/1408 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for handling soft zoning violations, the method comprising:
assigning a first target device and an endpoint device that is coupled to a switch port of a Fibre Channel (FC) switch to one or more zones in a soft zoning environment;
in response to the endpoint device logging into the FC switch, obtaining sampled traffic that originates at the endpoint device and ingresses at the switch port;
obtaining from the sampled traffic a source identifier associated with the endpoint device and a destination identifier associated with a target device; and
using the source identifier and the destination identifier to determine that the sampled traffic comprises a second traffic that is intended for a second target device that has not been assigned to the one or more zones, performing one or more actions to restrict the second traffic.