Go back to
350-040 - CCIE Storage Networking Written Exam
Select the description of how the trespass feature works:
Trespass permits multiple hosts to access the same lun.
Trespass is used to bypass traditional lun masking, and permit access to masked luns within the storage array.
Trespass is used to trigger an array to make a lun available out a secondary port in the event there is a failure on the primary port.
Trespass is used to permit the iscsi virtual target to reside in multiple zones at the same time.
Trespass is used to suppress available luns from being seen by initiators that do not need to see them.
Want to practice for 350-040 - CCIE Storage Networking Written Exam ?