Rules for creating host security groups, Rules for creating host, Security groups – HP Storage Essentials NAS Manager Software User Manual

Page 406: Rules for creating host security, Groups

Advertising
background image

Provisioning Manager

374

• Click Tools > Storage Essentials > System Manager in HP Systems Insight Manager.

Then, double-click the storage system displayed in the right pane.

2.

Scroll to the bottom of the Navigation page.

3.

Click the Change button.

4.

Select the cache block size from the drop-down menu. Set a higher cache size for applications

that requires a lot of input and output, such as multimedia.

5.

Click OK.

Modifying the Cache Settings (Engenio and Sun 6130 Only)

To modify the cache settings:

1.

Click Tools > Storage Essentials > Provisioning Manager in HP Systems Insight Manager.

2.

In the right pane, click the Storage Systems tab.

3.

In the right pane, click the Provision button corresponding to the storage system in which you

want to access information about volumes.

4.

Click Step 2 Volume.

5.

Click the Edit button (

) corresponding to the volume you want to modify.

6.

Type the cache read ahead multiplier (0 to 65535 bytes) in the Cache read-ahead multiplier

field.
A cache read ahead multiplier copies additional data blocks into the cache while it is reading

and copying host-requested data blocks from disk to cache. To disable this option, type 0.

7.

(Optional) Select Read Caching.
When this option is enabled, the host's operations are stored in controller cache memory.

8.

(Optional) Select Write Caching.
When this option is selected, data is written to the cache memory of a controller

9.

(Optional) Select Write Caching with Mirroring.
Use this option to preserve data if a controller or the cache fails. When this option is enabled,

the data is written to two redundant controllers of the same cache size. This configuration

provides redundancy in case a controller fails. One controller performs uncompleted write

operations when the other controller fails.

10.

To change the current owner, select a new owner from the Current Owner drop-down menu.

11.

Click OK.

Rules for Creating Host Security Groups

The management server now uses host security groups instead of LUN masking and LUN mapping.

With the introduction of host security groups, the management server has a new definition of

mapped for this release. Mapped is capacity that is accessible by one or more hosts external to the

array (aggregated capacity of volumes that are accessible from hosts external to the subsystem).

Advertising