Method and apparatus for limiting access to control units
channel-connected to host computers through a FICON switch. The control
unit port of the FICON switch receives a requests from an attached host
to provide configuration information regarding the switch ports. The
control unit port deliberately misrepresents the port configuration of
the switch by reporting that ports outside the zone of the requesting
host are not installed, even though these ports may in fact be installed
for use by other hosts that belong to other zones.