Authentication window (Fibre Channel port selected)

Device Manager - Storage Navigator secondary windows must be defined for use in advance. When you select Modify from this window to make user authentication settings, other users or programs are prevented from changing storage system settings. When you close the secondary window, Modify mode is released. For more information about Device Manager - Storage Navigator secondary windows and Modify mode, see the System Administrator Guide of your storage system.

On the menu bar, click Actions Port/Host Group, Fibre Authentication. The Authentication secondary window opens.

Port tree

Use this tree to find information about user authentication on each port. When you select a port from this tree, the Authentication Information (Target) list on the right provides user information of the hosts that are registered on the port. In addition, the Authentication Information (Host) list below the Authentication Information (Target) list provides the user information of the selected port.

Double-click the Fibre folder to view all Fibre Channel ports in the storage system. The Fibre folder is available only if the storage system contains a Fibre Channel board. Double-click the Fibre Channel ports to view host groups in that port. The host group name appears beside the icon.

Item

Description

CLX-Y

Indicates a Fibre Channel port.

host group name

Indicates that the host group performs authentication of hosts.

host group name

Indicates that the host group does not perform authentication of hosts.

Authentication information (target) list

The list on the right provides user information of the host groups that are allowed to connect to the port or host group specified in the tree.

Item

Description

Group Name

Names of the host group.

User Name

User name of the host group. When the user name is not defined for a host group, this column is blank.

Authentication

Indicates whether to perform user authentication for the host.

  • Enable: The host is a target of user authentication.
  • Disable: The host is not a target of user authentication.

Authentication information (host) list

Below the User Information (Target) list appears a list that provides user information of the host selected in the port or host group in the tree. In this list, you can register up to 64 user information items.

Item

Description

Group Name

Name of the host group.

User Name

User name of the host. When the user name is not defined for a host, this column is blank.

Protocol

Indicates the protocol in use for user authentication. Always CHAP.