
Table of Contents
Driver for Linux - User Manual Page v
Understand Device Numbering.............................................................................. 62
Download PCI Configuration ................................................................................. 62
The Configuration File (lpfc.conf)........................................................................... 63
The 'devlabel' Tool ................................................................................................. 66
View Target Mapping and Set Up Persistent Binding............................................. 66
View Target Mapping ....................................................................................... 66
Set Up Persistent Binding................................................................................ 67
Add Persistent Binding .................................................................................... 68
HBAnyware Security.............................................................................................. 70
Introduction ..................................................................................................... 70
Start the HBAnyware Security Configurator..................................................... 70
Prerequisites ............................................................................................. 70
Procedure ................................................................................................. 71
Run the Configurator for the First Time/Create the ACG ................................. 71
Designate a Master Security Client ................................................................. 72
Access Control Groups.................................................................................... 72
Introduction ............................................................................................... 72
Access Control Group Tab on the MSC..................................................... 72
Access Control Group Tab on a Non-MSC ................................................ 73
ACG Icons................................................................................................. 74
Create the ACG ........................................................................................ 74
Add a Server to the ACG .......................................................................... 75
Delete a Server from the ACG .................................................................. 76
Remove Security from all Servers in the ACG........................................... 77
Generate New Security Keys .................................................................... 78
Restore the ACG to Its Last Saved Configuration ..................................... 80
Access a Switch ........................................................................................ 80
Access Sub-Groups......................................................................................... 81
Introduction ............................................................................................... 81
ASG Icons................................................................................................. 82
Create an ASG.......................................................................................... 82
Reserved Indices - Examples.................................................................... 84
Add a Server to an ASG............................................................................ 84
Deleting an ASG ....................................................................................... 85
Restore an ASG to Its Last Saved Configuration ...................................... 85
Edit an ASG .............................................................................................. 85
About Offline ASGs ................................................................................... 87
Backup Masters............................................................................................... 87
Introduction ............................................................................................... 87
Backup Master Eligible Systems ............................................................... 88
Backup Master Tab and Controls .............................................................. 89
Create a Backup Master ........................................................................... 89
Reassign a Backup Master as the New MSC from the Old MSC .............. 90
Reassign a Backup Master as the New MSC from the Backup Master ..... 90
Troubleshooting....................................................................................92
Introduction............................................................................................................ 92
Unusual Situations and Their Resolutions ............................................................. 92
General Situations........................................................................................... 92
Security Configurator Situations - Access Control Groups (ACGs).................. 96
Security Configuration Situations - Access Sub-Groups (ASG) ....................... 97
Kommentare zu diesen Handbüchern