access attributes
assigning to a volume
changing to read-only or protect
changing to read/write
configuring
expiration lock
overview
permitted operations
requirements
reserving volumes
restrictions
retention term
workflow
alternate LU paths
Attribute command
Changing an access attribute to read-only or protect
Changing an access attribute to read/write
authentication
configuring on fibre channel ports
configuring on fibre channels
fabric switch
fibre channel
host settings
hosts and host groups
hosts, enabling fibre channel switch
mutual
mutual of ports
port settings
users
basic provisioning
overview
workflow
boundary values for RAID levels
capacity of a slot
Changing External LDEV Capacity
CHAP authentication
Settings for authentication of hosts
Example of authenticating hosts in a fibre channel environment
Port settings and connection results
fabric switch authentication
fabric switch authentication
fabric switch settings and connection results
Registering host user information
Registering host user information
Registering user information for a host group (for mutual authentication)
Registering user information on a fibre channel port
Registering user information on a fabric switch
Host and host group authentication
Host and host group authentication
Setting fibre channel authentication
Command Control Interface
access attributes restrictions
command device
correspondence table for defining devices
Create LDEV function
custom-sized provisioning
overview
data retention strategies
Data Retention window
data transfer speed
fibre channel ports
devices
correspondence table
DP-VOL
requirements
Error Detail dialog box
expiration lock
enabling/disabling
fabric switch
fabric topology
FC-AL (fibre channel-arbitrated loop) topology
fibre channel authentication
setting
fibre channel ports
addresses
configuring
Setting the fabric switch
Configuring fibre channel ports
configuring authentication
Fibre channel authentication
Fibre channel port authentication
data transfer speed
registering user information
setting port information
fibre channel switch
authentication settings and connection results
clearing user information
enabling or disabling authentication
registering user information
setting authentication mode
fibre channel topology
overview
fixed-sized provisioning
overview
HBA iSCSI name
changing
host authentication
disabling in a host group
enabling in a host group
host bus adapters
changing HBA iSCSI name
changing WWNs
deleting from host group
host group 0
initializing
host groups
adding
Adding a selected host to a host group
Adding a host to the selected host group
authentication
changing host mode
changing name
creating
deleting
deleting host bus adapters
host mode options
listed and defined
host modes
listed and defined
hosts
authentication
changing host user information
configuring
configuring workflow
deleting host user information
registering host group user information
registering host user information
registering in host group
registering in iSCSI target
removing from iSCSI target
iSCSI target
changing setting
creating
iSCSI targets
adding
deleting
remove hosts
LDEVs
blocking
Blocking LDEVs
Blocking LDEVs in a parity group
changing settings
creating
deleting (converting to free space)
editing name
formatting
About formatting LDEVs
Formatting LDEVs
Formatting LDEVs
formatting in a parity group
removing from registering task
restoring if blocked
Restoring blocked LDEVs
Restoring blocked LDEVs in a parity group
leap year
logical units
logical volumes
managing
login iSCSI names
deleting
LU paths
configuration workflow
configuring
configuring on fibre-channel
defining
Defining LU paths
Defining LU paths
defining alternate
Defining alternate LU paths
Defining alternate LU paths
deleting
managing
rules, restrictions, and guidelines
viewing settings
LUN
defined
LUN security
enabling on ports
example of disabling
example of enabling
settings for authentication of hosts
settings for authentication of ports
LUN security on ports
disabling
management area capacity
open-systems volume
managing hosts for fibre channel
managing hosts for iSCSI
managing logical volumes
rules, restrictions, and guidelines
workflow
meta_resource
monitoring capacity
mutual authentication
ports
Mutual authentication of ports
Registering user information for a host group (for mutual authentication)
Registering user information for a host group (for mutual authentication)
nicknames
changing
Changing WWN or nickname of a host bus adapter
Changing HBA iSCSI name or nickname of a host bus adapter
operating system and file system capacity
Parity groups
configuring volumes
creating
formatting
performance
optimizing by setting data transfer speed for a fibre channel port
Performance Monitor
automatic starting considerations
point-to-point topology
pool capacity
decreasing
increasing
stop decreasing
pool information
viewing
pool name
changing
pool subscription limit
changing
pool threshold
changing
pool-VOLs
requirements
pools
creating
deleting
managing
recovering
requirements
ports
mutual authentication
rules, restrictions, and guidelines
provisioning key terms
Quick Format function
RAID levels
boundary values
reclaiming pages in a V-VOL
reserving volumes with access attributes
resource groups
adding resources to
assignments
changing name
creating
deleting
example not sharing a port
example sharing a port
license requirements
meta_resource
overview
removing resources from
resource lock
rules, restrictions, and guidelines
strategies
system configuration
user groups
resource lock
retention term
changing access attributes
S-VOL disable attribute
secret, in CHAP authentication
ShadowImage
shared memory requirements for provisioning
SIM reference codes
listed
SIMs
overview
slot capacity
subscription limit of a pool
changing
system requirements for provisioning
thin provisioning
configuring
example
overview
Dynamic Provisioning Overview
Dynamic Provisioning overview
requirements
workflow
Dynamic Provisioning workflow
Dynamic Provisioning workflow
tier capacity
reserving
reserving example
tier relocation
rules, restrictions, and guidelines
tiering
workflow
tiering policy
changing execution modes example
notes on using
overview
relationship with graphs
relationship with tiers
reserving tier capacity
setting on a V-VOL
topology
example of FC-AL and point-to-point
troubleshooting
provisioning while using CCI
thin provisioning
TrueCopy
>>