?
Solved

wwpn number to hosts

Posted on 2012-03-14
4
Medium Priority
?
465 Views
Last Modified: 2012-06-27
IF I understand correctly,  after we connect server's HBA port to san switch, and if we do "switchshow"  on SAN switch, it suppose to show the WWPN number of the server right?
0
Comment
Question by:mokkan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 1332 total points
ID: 37721453
"switchshow" shows all switch ports and the WWPNs of the adapters connected to these ports, including state (Online/Offline/No Module), protocol (fabric/AL/trunk), speed and media (GBIC) type.

At the top of the report it shows various switch details including the WWN of the switch itself.

Far more info is on the Help page, issue "help switchshow".
0
 
LVL 9

Assisted Solution

by:Shani Basha
Shani Basha earned 668 total points
ID: 37724363
Yes, this shows the wwpn of the adapter in the server
0
 

Author Comment

by:mokkan
ID: 37724739
Thank you very much. When you do zoning, would you recommend hard zoning or soft zoning?
0
 
LVL 68

Accepted Solution

by:
woolmilkporc earned 1332 total points
ID: 37724762
If you don't have very elevated security requirements go with soft zoning provided by your switches.

It doesn't require any additional hardware feature and is easy to configure (at least with switches like your Brocade/IBM model).

wmp
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
Suggested Courses
Course of the Month13 days, 9 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question