With software-enforced zoning, all hosts are allowed to log on to the fabric. An unauthorized host won’t be able to communicate with other devices, but it will be able to access management services on the switch. For example, a security breach can occur when an unauthorized HBA connects to the fabric and queries the Name Server or the Fabric Management Server. (Remember that the Fabric Management Server dispenses information without regard to zone.) Because the unauthorized host now has access to information about the fabric—such as the WWNs of all connected devices—security has been compromised.