Systems, methods, and apparatus for spoofing a port of a host entity to identify data that is stored in a storage system and may be accessed by the port of the host entity
First Claim
Patent Images
1. A method of providing data management services, the method comprising:
- determining, by a device located in a path between a first port of a host entity and a second port of a switch, an identifier of the first port;
adding the identifier of the first port of the host entity to a third port of the device;
transmitting, by the device, to the switch, a request for information identifying one or more ports that are zoned to the first port of the host entity;
receiving information relating to a storage system in response to the request;
identifying data that is stored in a storage system and to which the first port has access, based on the information received; and
providing a data management service with respect to the identified data.
1 Assignment
0 Petitions
Accused Products
Abstract
A first device in a network, having a first port, receives an identifier of a second port of a second device in the network, the network comprising a host entity, a switch, and a storage system. The first port of the first device spoofs the second port of the second device, during a communication with the switch. The first device receives information identifying a third port of a third device in the network that is zoned to the second port of the second device. The device identifies data stored in the storage system that may be accessed by the host entity, based at least on the information.
-
Citations
18 Claims
-
1. A method of providing data management services, the method comprising:
-
determining, by a device located in a path between a first port of a host entity and a second port of a switch, an identifier of the first port; adding the identifier of the first port of the host entity to a third port of the device; transmitting, by the device, to the switch, a request for information identifying one or more ports that are zoned to the first port of the host entity; receiving information relating to a storage system in response to the request; identifying data that is stored in a storage system and to which the first port has access, based on the information received; and providing a data management service with respect to the identified data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device comprising:
-
a memory storing computer program instructions; and a processor communicatively coupled to the memory, the processor configured to execute the computer program instructions which, when executed on the processor, cause the processor to perform operations comprising; determining that the device is located in a path between a first port of a host entity and a second port of a switch; determining an identifier of the first port; adding the identifier of the first port of the host entity to a third port of the device; transmitting, by the device, to the switch, a request for information identifying one or more ports that are zoned to the first port of the host entity; receiving information relating to a storage system in response to the request; identifying data that is stored in a storage system and to which the first port has access, based on the information received; and providing a data management service with respect to the identified data. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable medium having program instructions stored thereon, that, in response to execution by a computing device, cause the computing device to perform operations comprising:
-
determining that the computing device is located in a path between a first port of a host entity and a second port of a switch; determining an identifier of the first port; adding the identifier of the first port of the host entity to a third port of the device; transmitting, by the device, to the switch, a request for information identifying one or more ports that are zoned to the first port of the host entity; receiving information relating to a storage system in response to the request; identifying data that is stored in a storage system and to which the first port has access, based on the information received; and providing a data management service with respect to the identified data. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification