GreenLake Administration
- Community Home
- >
- Storage
- >
- Midrange and Enterprise Storage
- >
- HPE EVA Storage
- >
- Re: SAN
HPE EVA Storage
1855491
Members
4529
Online
104111
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Knowledge Base
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Knowledge Base
Forums
Discussions
- Cloud Mentoring and Education
- Software - General
- HPE OneView
- HPE Ezmeral Software platform
- HPE OpsRamp
Knowledge Base
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-06-2006 11:35 PM
08-06-2006 11:35 PM
SAN
hi,
Can anyone tell me what are all the steps involved in configuring a an FC switch in SAN environment. I don't need command instead i need to know only the proceedure.
thanks in advance
Can anyone tell me what are all the steps involved in configuring a an FC switch in SAN environment. I don't need command instead i need to know only the proceedure.
thanks in advance
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-08-2006 05:19 AM
08-08-2006 05:19 AM
Re: SAN
Hello Hari,
Unfortunately, there is a lot more to this in SAN environment depending on what kind of topology are you using, what kind of switches how many fabrics, high availability requirements, is it a multi vendor SAN ?
Let us know what type of environment you have and I can point you in the right direction.
In a most basic core-edge topology with redundant fabrics, you would have atleast 2 core switches and 2 edge switches one of each would be in 'A' fabric. to configure, you would use the configuration tools provided by the Vendor (Brocade, Cisco and/or McData and so on). Configure the TCP/IP details for monitoring/managing. Once this is done for all the switches and are able to connect to them, you are ready to set it up for zoning. Zoning is a whole different subject ranging from hard,soft and mixed and is beyond the scope of this question. You can find good information by googling. Anyways, zoning helps you restrict un-authorized access to/from devices in a Fabric. And you would have to do device level masking to further enhance the un-authorized access to/from devices. Hopefully, this gave you some information, based on which you can find out more on the web or by attending some swithch vendor specific classes.
Bhanu
Unfortunately, there is a lot more to this in SAN environment depending on what kind of topology are you using, what kind of switches how many fabrics, high availability requirements, is it a multi vendor SAN ?
Let us know what type of environment you have and I can point you in the right direction.
In a most basic core-edge topology with redundant fabrics, you would have atleast 2 core switches and 2 edge switches one of each would be in 'A' fabric. to configure, you would use the configuration tools provided by the Vendor (Brocade, Cisco and/or McData and so on). Configure the TCP/IP details for monitoring/managing. Once this is done for all the switches and are able to connect to them, you are ready to set it up for zoning. Zoning is a whole different subject ranging from hard,soft and mixed and is beyond the scope of this question. You can find good information by googling. Anyways, zoning helps you restrict un-authorized access to/from devices in a Fabric. And you would have to do device level masking to further enhance the un-authorized access to/from devices. Hopefully, this gave you some information, based on which you can find out more on the web or by attending some swithch vendor specific classes.
Bhanu
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-08-2006 06:47 AM
08-08-2006 06:47 AM
Re: SAN
The procedure depends of your configurations requirements, topology, hardware used, and so on.
A good point to start is to identify the requirements of your SAN in terms of performance, availability, flexibility, zoning.
This is a good document that you can start with:
"HP StorageWorks SAN Design Reference Guide"
Available at:
http://h20000.www2.hp.com/bizsupport/TechSupport/DocumentIndex.jsp?contentType=SupportManual&locale=en_US&docIndexId=179911&taskId=101&prodTypeId=12169&prodSeriesId=406734
A good point to start is to identify the requirements of your SAN in terms of performance, availability, flexibility, zoning.
This is a good document that you can start with:
"HP StorageWorks SAN Design Reference Guide"
Available at:
http://h20000.www2.hp.com/bizsupport/TechSupport/DocumentIndex.jsp?contentType=SupportManual&locale=en_US&docIndexId=179911&taskId=101&prodTypeId=12169&prodSeriesId=406734
Por que hacerlo dificil si es posible hacerlo facil? - Why do it the hard way, when you can do it the easy way?
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2026 Hewlett Packard Enterprise Development LP