
Controller Installation
2.3.9Setting Security Levels
After you have formatted all the LUNs, you can define users’ access rights. Configurations come in two types:
•authorized user
•host port zoning
The Authorized User configuration is highly recommended for use in a SAN
The Host Port Zoning configuration provides the minimum level of security. The LUN mappings change according to the host port connection. The
The place holder LUN feature allows the controller administrator to map a
NOTE : Support of place holder LUNs is dependent upon the OS (operating system), the driver, and the Host Card Adapter
2.3.9.1User Authentication (Recommended for SAN Environment)
Each user connected to the controller is identified by a World Wide Name (WWN) or GUID, and is given a unique user ID number. The controller can store configurations for up to 512 users and the security settings apply to all host ports.
Below is an example for adding two users to a system containing two LUNs (numbered 0 and 1). Each user has an internal LUN 1 is shared and
Prior to adding any users, verify that no “anonymous” access is allowed to the system:
1.Enter: zoning<Enter>
24 |