Access control methods for NEC iStorage

You can use access control to restrict access from hosts and Lenovo Storage V series clustered systems. You do not need to use access control to allow a Lenovo Storage V series system to use all of the defined logical units on the system. Use the table below to view the available access control methods.

Table 1 lists access control methods that are available.

Table 1. Available access control methods
Method Description
Port Mode Allows access to logical units that you want to define on a per-storage-controller port basis. Lenovo Storage V series visibility (such as through switch zoning or physical cabling) must allow the Lenovo Storage V series system to have the same access from all nodes. The accessible controller ports must also be assigned the same set of logical units with the same logical unit number. This method of access control is not recommended for a Lenovo Storage V series connection.
WWN Mode Allows access to logical units using the WWPN of each of the ports of an accessing host device. All WWPNs of all the Lenovo Storage V series nodes in the same system must be added to the list of linked paths in the controller configuration. This becomes the list of host (Lenovo Storage V series) ports for an LD Set or group of logical units. This method of access control allows sharing because different logical units can be accessed by other hosts.