Configuring
Configure host connections, nodes, systems, users, disk controllers, and event logs. Use and define configuration rules for various components of your SAN: host bus adapters (HBAs), nodes, switches, disk controllers, and Fibre Channel or iSCSI connections.
- Host attachment
You can set the various parameters for host attachment. - Configuration details
Storage area network (SAN) configurations that contain nodes must be configured correctly. - Initializing the system
The initialization process uses the management GUI and the technician port. - Configuring and servicing storage systems
To avoid performance issues, you must ensure that your SAN-attached storage systems and switches are correctly configured to work efficiently with symmetric virtualization. - Configuring user authentication
You can configure authentication and authorization for users of the system. - Configuring security level options by using the CLI
At times, you might need to configure or change the Secure Sockets Layer (SSL), Transport Layer Security (TLS), or Secure Shell (SSH) security level settings for a system either to resolve an error or to further restrict the range of protocols that can be used. - Configuring secure communications
Secure communications between systems requires that certificates are configured on the system. To ensure that the certificate and public ID of the system are valid and secure, each system has a digital Secure Sockets Layer (SSL) certificate. - Configuring support assistance
You can configure either local or remote support assistance with the management GUI or the command-line interface. - Configuring encryption
The system supports optional encryption of data at rest. This support protects against the potential exposure of sensitive user data and user metadata that is stored on discarded, lost, or stolen storage devices. - Configuring N_Port ID Virtualization
N_Port ID Virtualization (NPIV) is a method for virtualizing a physical Fibre Channel port that is used for host I/O. When NPIV is enabled, ports do not come up until they are ready to service I/O, which improves host behavior around node unpends. In addition, path failures due to an offline node are masked from host multipathing. - Configuring the system for iSCSI hosts
You need to complete several tasks to configure the system to work with iSCSI-attached hosts. The tasks include general tasks on the host system before you configure a system. - Configuring host objects on a clustered system
You can configure Fibre Channel or iSCSI-attached hosts to a clustered system. - Configuring IP partnerships
There are specific configuration requirements to partner two systems over native IP links connected directly or by Ethernet switches. The topics provided here describe the configuration settings that are needed for IP partnerships. - Configuring transparent cloud tiering
With transparent cloud tiering, you can configure a cloud account on the system to be able to create and restore cloud snapshots of system volumes. - Configuring Virtual Volumes
After you ensure that your environment meets the prerequisites for VMware vSphere Virtual Volumes, you must first enable the function by using the management GUI or the command-line interface (CLI). You then configure and register the IBM® Spectrum Control Base Edition server as a storage provider in VMware vCenter.