The HBAnyware Utility User Manual Page iv
Viewing Target Mapping (Linux)................................................................39
Viewing and Setting Up Authentication (Windows, Linux 8.2,
Solaris LPFC and Solaris emlxs (SFS))..............................................40
Viewing or Changing Authentication Configuration.............................42
Changing Your Password....................................................................42
Updating Firmware..........................................................................................43
Updating Firmware (Batch Mode)..............................................................44
Enabling or Disabling an HBA’s BIOS .......................................................47
Configuring the Driver .....................................................................................48
Setting Driver Parameters.........................................................................48
Restoring All Parameters to Their Earlier Values................................49
Resetting All Default Values................................................................49
Setting an HBA Parameter Value to the Host Parameter Value ..........50
Saving HBA Driver Parameters to a File.............................................50
Setting Driver Parameters for All HBAs in a Host ...............................50
Changing Non-dynamic Parameter Values (Linux)..............................51
Creating and Assigning a Batch Mode Driver Parameters File..................52
Storport Miniport Driver Parameters................................................................54
Driver for Solaris LPFC – Configuration File Reference .................................60
Driver For Solaris emlxs (SFS) Driver Parameters..........................................74
Solaris emlxs (SFS) and Solaris LPFC Driver Parameter Cross-Reference.... 79
Driver for Linux Parameter Tables...................................................................85
Version 8.0 LPFC and LPFCDFC Parameter ............................................85
Version 8.2 LPFC and LPFCDFC Parameter ........................................... 88
DH-CHAP Authentication and Configuration.......................................88
Enabling Authentication......................................................................88
The lpfc_enable_auth Module Parameter........................................... 88
The fcauthd Daemon ..........................................................................88
fcauth Daemon Parameters................................................................89
Setting Remote and Local Passwords ................................................89
Driver for VMware ESX Configuration Parameters..........................................92
Server Performance (Windows).......................................................................95
I/O Coalescing ..........................................................................................95
Performance Testing.................................................................................95
Mapping and Masking .....................................................................................96
Automapping SCSI Devices (Windows) ....................................................96
Mapping and Masking Defaults (Windows) ...............................................97
Setting Up Persistent Binding (Windows, Solaris LPFC and
Solaris emlxs (SFS)).................................................................................97
Adding New Targets Using sd.conf for Solaris 8 .................................99
HBAnyware Security............................................................................................100
Introduction ...................................................................................................100
Creating the Access Control Group...............................................................100
Designating a Master Security Client.............................................................101
Access Control Groups..................................................................................101
Introduction.............................................................................................101
Access Control Group Tab on the MSC...................................................102
Access Control Group Tab on a Non-MSC.............................................. 103
ACG Icons...............................................................................................103
Adding a Server to the ACG....................................................................104
Deleting a Server from the ACG..............................................................104
Removing Security from all Servers in the ACG......................................104
Generating New Security Keys ...............................................................104