HP XP Racks User Manual

Page 188

Advertising
background image

Not authenticating hosts (Case D)

Case D is an example of connecting via a host group that does not perform authentication of hosts.
The host will connect to the storage system without authentication of the host regardless of whether
the host is configured for authentication by host groups with CHAP. In this case, though you need
not register user information of the host on the host group, you can register it.

You should register user information of all the hosts to be connected to a host group that performs
authentication of hosts. To allow a specific host to connect to such a host group without
authentication, configure the host group and the host as follows.

On the host group: Register the user information of the host you want to allow to connect without
authentication, and then disable the authentication setting of the host.

Example of authenticating hosts in a fibre channel environment

Following is an example of authentication of hosts in a fibre channel environment. In this figure,
WWNs of host bus adapters (HBAs) are abbreviated, such as A, B, and so on.

In the example, host group 1 performs authentication of hosts, and host group 2 does not.

The user information of host A is registered on the host group 1, and the authentication setting is
enabled. Therefore, if the authentication of the host is successful, host A can connect to the storage
system (or, the processing goes on to the authentication of the host group). As a precondition of
successful authentication, host A should be configured for authentication by host groups with CHAP
.

The user information of host B is also registered on the host group 1, but the authentication setting
is disabled. Therefore, host B can connect to the storage system without authentication.

The user information of host C is not registered on the host group 1. Therefore, when host C tries
to connect to the storage system, the authentication fails and the connection request is denied
regardless of the setting on host C.

Host D is attached to the host group 2 that does not perform authentication of hosts. Therefore,
host D can connect to the storage system without authentication.

188 Managing logical volumes

Advertising
This manual is related to the following products: