Configuring Interswitch Links; Configure Security - HP StorageWorks Edge Switch 2/12 Installation Manual

Hide thumbs Also See for StorageWorks Edge Switch 2/12:
Table of Contents

Advertisement

The interface is refreshed and indicates the update changes in the Feature panel.
NOTE:
When OK is selected, all features are updated with new features.
3.
Click OK.
New PFE key(s) are activated, a non-disruptive (to Fibre Channel traffic) firmware reset occurs,
and the following message is displayed:
Feature installation in process. Your browser connection will be
unavailable until unit restart is complete.
After the product reset, the following message is displayed:
Feature installation complete. Click here to login.
4.
Upon completion of the product reset, click Click here to login to start a new HAFM
Basic session.
The Enter Network Password dialog box displays.

Configuring Interswitch Links

This section describes optional ISL performance features configured through Configure menu
selections. Features include:
Preferred path—Use the Preferred Path view to specify and configure one or more ISL data paths
between multiple fabric elements. At each fabric element, a preferred path consists of a source
port, exit port, and destination Domain_ID.
Port fencing—Use the Port Fencing view to minimize ISLs that bounce (repeatedly attempt to
establish a connection), causing disruptive fabric rebuilds. Fencing defines a bounce threshold
that, when reached, automatically blocks the disruptive E_Port.
Verify the LAN installation with the customer. If multiple products are installed or a public LAN
segment is used, network addresses must be changed to conform to the customer's LAN addressing
scheme.

Configure security

This section describes optional product security features configured through Security menu
selections. Features include:
Authentication Settings—The Authentication Settings view provides four pages to configure
optional SANtegrity Authentication features, including:
• User settings—Configure password-protected administrator and operator access to the
HAFM Basic and command line interfaces.
• Software settings—Configure challenge handshake authentication protocol (CHAP)
controlled management interface access (out-of-band and inband) to the product.
• Device settings—Configure a CHAP secret authentication sequence for nodes (devices)
attached to the product through E_Ports or N_ports.
• Port settings—Override product-level authentication settings and enable or disable device
communication on a per-port basis.
52
Using the HAFM Basic interface

Advertisement

Table of Contents
loading

Table of Contents