Emulex 3.4 Dust Collector User Manual


 
The HBAnyware Utility User Manual Page iv
Viewing Target Mapping (Linux) ................................................................ 39
Viewing and Setting Up Authentication (Windows, Linux 8.2,
Solaris LPFC and Solaris emlxs (SFS)) .............................................. 40
Viewing or Changing Authentication Configuration ............................. 42
Changing Your Password.................................................................... 42
Updating Firmware .......................................................................................... 43
Updating Firmware (Batch Mode).............................................................. 44
Enabling or Disabling an HBA’s BIOS ....................................................... 47
Configuring the Driver ..................................................................................... 48
Setting Driver Parameters......................................................................... 48
Restoring All Parameters to Their Earlier Values ................................ 49
Resetting All Default Values................................................................ 49
Setting an HBA Parameter Value to the Host Parameter Value .......... 50
Saving HBA Driver Parameters to a File............................................. 50
Setting Driver Parameters for All HBAs in a Host ............................... 50
Changing Non-dynamic Parameter Values (Linux).............................. 51
Creating and Assigning a Batch Mode Driver Parameters File.................. 52
Storport Miniport Driver Parameters ................................................................ 54
Driver for Solaris LPFC – Configuration File Reference ................................. 60
Driver For Solaris emlxs (SFS) Driver Parameters .......................................... 74
Solaris emlxs (SFS) and Solaris LPFC Driver Parameter Cross-Reference .... 79
Driver for Linux Parameter Tables ................................................................... 85
Version 8.0 LPFC and LPFCDFC Parameter ............................................ 85
Version 8.2 LPFC and LPFCDFC Parameter ........................................... 88
DH-CHAP Authentication and Configuration....................................... 88
Enabling Authentication ...................................................................... 88
The lpfc_enable_auth Module Parameter ........................................... 88
The fcauthd Daemon .......................................................................... 88
fcauth Daemon Parameters ................................................................ 89
Setting Remote and Local Passwords ................................................ 89
Driver for VMware ESX Configuration Parameters.......................................... 92
Server Performance (Windows)....................................................................... 95
I/O Coalescing .......................................................................................... 95
Performance Testing ................................................................................. 95
Mapping and Masking ..................................................................................... 96
Automapping SCSI Devices (Windows) .................................................... 96
Mapping and Masking Defaults (Windows) ............................................... 97
Setting Up Persistent Binding (Windows, Solaris LPFC and
Solaris emlxs (SFS)) ................................................................................. 97
Adding New Targets Using sd.conf for Solaris 8 ................................. 99
HBAnyware Security............................................................................................ 100
Introduction ................................................................................................... 100
Creating the Access Control Group............................................................... 100
Designating a Master Security Client............................................................. 101
Access Control Groups.................................................................................. 101
Introduction ............................................................................................. 101
Access Control Group Tab on the MSC................................................... 102
Access Control Group Tab on a Non-MSC.............................................. 103
ACG Icons............................................................................................... 103
Adding a Server to the ACG.................................................................... 104
Deleting a Server from the ACG.............................................................. 104
Removing Security from all Servers in the ACG...................................... 104
Generating New Security Keys ............................................................... 104