| Chapter | |
Host Configuration | 3 |
|
|
|
|
In this chapter
•Host security authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
•Buffer credits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
•Basic port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
•Boot over SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
•Virtual port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
•HCM logging levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
•Advanced port configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
•Name configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
•NPIV . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Host security authentication
Use the HCM GUI or the Brocade command line utility (BCU) to display the authentication settings and status. There are five
NOTE
Security authentication is not supported on Solaris platforms.
Configuring security authentication using HCM (Host and HBA)
You can access the Fibre Channel Security Protocol Configuration dialog box by selecting the Host, an HBA, or an HBA port from the device tree.
NOTE
Fibre Channel Security Protocol
1.Select the appropriate device based on how you want to configure security authentication:
•From the host level, select the host from the device tree.
•From the HBA level, select the adapter from the device tree.
•From an HBA port, select a port from the device tree.
Brocade Adapters Administrator’s Guide | 17 |
|