beautypg.com

Rules for creating host security groups, 54 allowed initiators in host security groups, Rules for creating host – HP Storage Essentials NAS Manager Software User Manual

Page 395: Security groups, Rules for creating host security, Groups

background image

Storage Essentials 5.1 User Guide 363

When this option is enabled, the host's operations are stored in controller cache memory.

8.

(Optional) Select Write Caching.
When this option is selected, data is written to the cache memory of a controller

9.

(Optional) Select Write Caching with Mirroring.
Use this option to preserve data if a controller or the cache fails. When this option is enabled,

the data is written to two redundant controllers of the same cache size. This configuration

provides redundancy in case a controller fails. One controller performs uncompleted write

operations when the other controller fails.

10.

To change the current owner, select a new owner from the Current Owner drop-down menu.

11.

Click OK.

Rules for Creating Host Security Groups

The management server now uses host security groups instead of LUN masking and LUN mapping.

With the introduction of host security groups, the management server has a new definition of

mapped for this release. Mapped is capacity that is accessible by one or more hosts external to the

array (aggregated capacity of volumes that are accessible from hosts external to the subsystem).
The number of initiators allowed in the HSG depends on the type of storage system:

Table 54

Allowed Initiators in Host Security Groups

Storage System

Allowed Initiators in HSGs

EMC CLARiiON

0 or more initiators

Engenio (LSI)

0 or more initiators

HDS

0 or more initiators

HP EVA and MSA

0 or more initiators

IBM

only one initiator per host security group

Sun 35xx

One initiator per host security group

Sun 6920 and 6940

only one initiator per host security group

Sun 6130

0 or more initiators

Symmetrix

one initiator for host security masking

Xiotech

1 initiator