Software

Performing Logical Group Operations 93
Figure 7-26 Modifying Security – Step 2: Select WWNs
Figure 7-27 Modifying Security – Warning