HSG80 ACS Solution Software Version 8.7 for Compaq Tru64 UNIX Installation and Configuration Guide

Table Of Contents
Preparing the Host System
3–24 HSG80 ACS Solution Software Version 8.7 for Compaq Tru64 UNIX Installation and
Configuration Guide
The state of the connection can be displayed using:
CLI> SHOW CONN <FULL>
<<< LOCKED >>> appears in the title area when the connection table is locked. If
unlocked, or not supported (HOST_FC only), the title area looks the same as it did for
ACS version 8.6. The full switch displays the rejected hosts, with an index.
Adding Rejected Host Connections to Locked Host Connection Table
With ACS version 8.7, it is now possible to keep track of rejected hosts in a list, and to
keep this list synchronized across controllers. An index is now added to the record to
aid the user in manually adding rejected connections. The command to manually add
rejection connections is:
ADD CONNECTION REJECTED_HOST <index>
This adds the connection to the connection table in an OFFLINE state. The host must
issue a FC plogi to make the connection active. There are mechanisms to do this in
UNIX, VMS, but not NT (except reboot).
One way to force the connection into an online state is to do the following:
CLI> SET <THIS | OTHER> PORT_<1|2>_TOPOLOGY = OFFLINE, followed by
CLI> SET <THIS | OTHER> PORT_<1|2>_TOPOLOGY = FABRIC
This will force all hosts connected to that controller/port to login again. At the same
time, hosts connected to the controller pair through the same switch (regardless of
controller|port) will need to login again
NOTE: This implementation is the safest, since pinging the fabric name server would result in
all hosts logging in again (up to 96).
When the connection is added, it gets deleted from the reject list. Index numbers for
remaining rejected hosts are re-ordered.
Implementation Notes
For an upgrade to version 8.7 - The connection table is unlocked by default.
For Backward Compatibility - Lock the table, and everything work the same as
version 8.6.
To Create a new SAN - Basically the system administrator unlocks the connection
table, connect the desired hosts, and then lock the connection table. As the hosts
are connected they login to the controller pair. After the connection table is
locked, the host logins are rejected until the system administrator manually adds
the host to the connection table.