www.dell.com | support.dell.comDell™ PowerVault™Network Attached Storage(NAS) SolutioniSCSI Deployment Guide
10 Introduction• It is a good practice to have two ports dedicated for iSCSI. Configure each NIC (or ports if you have a multiport NIC) on a separate
Introduction 11Figure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICs NOTE: For a detailed configuration of the iSCSI Targe
12 IntroductionFigure 1-2. Redundant iSCSI Paths With Three NICs NOTE: For a detailed configuration of the iSCSI Target, see "Target Details"
Setup Steps for Initiator-Target Connection 13Setup Steps for Initiator-Target ConnectionThis section provides step-by-step instructions to set up an
14 Setup Steps for Initiator-Target ConnectionThe following steps guide you through setting up an iSCSI Target and establishing connection from an Ini
Setup Steps for Initiator-Target Connection 156The Create iSCSI Target wizard displays the iSCSI Target Identification option. Enter a Name and Descri
16 Setup Steps for Initiator-Target ConnectionfSelect Next. NOTE: IQNs work regardless of the DNS configuration. You can also specify the IP address
Setup Steps for Initiator-Target Connection 17Log on - Configuring the Initiator-Target Connection From Initiator (Host)1From the iSCSI Initiator (hos
18 Setup Steps for Initiator-Target Connection8To initialize and configure the iSCSI device as local drive and perform iSCSI I/O operations, select Co
Setup Steps for Initiator-Target Connection 19Setting Up the Target (PowerVault Storage System)1From the PowerVault storage system, go to Start→ Serve
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indica
20 Setup Steps for Initiator-Target Connection
Target Details 21Target DetailsThis section describes the end-to-end iSCSI setup, including settings for the iSCSI Initiator, Target, and establishin
22 Target Details2Preparing LUNs for use—The PowerVault NAS storage solution runs on a Microsoft Windows® operating system based platform. The steps t
Target Details 234Creating iSCSI Targets—To create an iSCSI Target:Figure 3-1. Creating iSCSI TargetsaIn the PowerVault NAS Management Console, right
24 Target Details•Go to Advanced Identifier→ Add→ Add/Edit Identifier→ Identifier Type and select either IQN, DNS Domain Name, IP address, or MAC Addr
Target Details 25dChoose the size for the virtual disk and click Next. For this example, we choose a size of 100 GB from the available 501 GB on this
26 Target Details• Create Snapshot—You can take a snapshot of the virtual disk contents at any given instance.• Disk Access—Mount Read/Write (Provisio
Target Details 27dIn the Assign Drive Letter or Path screen, assign the driver letter from drop-down menu. Click Next.eIn the Format Partition screen
28 Target DetailsSnapshots that are created on the iSCSI Target server are crash consistent. iSCSI snapshots are created using VSS and a storage array
Target Details 293After making necessary changes, click OK. CAUTION: Even if you do not change the default settings, go to Volume→ Properties→ Shado
Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power
30 Target Details7The Frequency screen appears and lists the different options namely—Daily, Weekly, Monthly, and On-time only. Choose one option and
Target Details 31• Delete snapshot—Select the snapshot that you want to delete, right-click the snapshot and click Delete. NOTE: You cannot delete
32 Target DetailsDisconnecting/Cleaning Up iSCSI DevicesThis section describes the procedure for cleanup operations to be performed on iSCSI devices.
Target Details 333To delete a virtual disk, choose the Devices option, right-click on the virtual disk from middle pane, and select Delete Virtual Di
34 Target Details
Configuring Secured iSCSI Connections Using CHAP 35Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication ProtocolFew security
36 Configuring Secured iSCSI Connections Using CHAPCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers sharing a secr
Configuring Secured iSCSI Connections Using CHAP 37iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you have enabled CH
38 Configuring Secured iSCSI Connections Using CHAPTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Target Settings&qu
Appendix 39AppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefly
4 Contents3 Target Details . . . . . . . . . . . . . . . . . . . . 21Setting Up Target IP Addresses in the PowerVault™NAS Storage Solution . . . .
40 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha
Appendix 41Figure A-2. Discovery Tab in iSCSI Initiator Properties WindowiSNS Servers—You can also perform Target discovery using iSNS servers.Add the
42 AppendixTargets TabThe Targets tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Target
Appendix 43If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I
44 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r
Appendix 45Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato
46 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:• Go to iSCSI Initiator Properties→ Tar ge ts t
Appendix 47Devices TabThe Devices tab of Target Properties screen provides generic device details like the virtual disks that are associated with Targ
48 AppendixProperties TabThe Properties tab of Target Properties screen provides information about Target Alias, Authentication, Associated Network po
Appendix 49Configuring the iSNS ServeriSNS server performs the automatic discovery of iSCSI Initiators and Targets; after you register them with iSNS
Contents 5Advanced Configuration Details . . . . . . . . . . . . 45Enabling Multi-Path on the Initiator . . . . . . . . 45Using the Advanced Opti
50 Appendix2You can use the Discovery Domains feature to group certain Initiators with Targets with specific access:aGo to iSNS Server Properties→ Dis
Appendix 51Securing data on an iSCSI SAN—To help secure data transfers between the server and the subsystem, configure security for the login sessions
52 AppendixThe wizard was unable to import one or more virtual disks. Make sure that the files are not in use, and then run the wizard again.• Initiat
Appendix 53server running Microsoft iSCSI Software Target has IP addresses that are not used to communicate with the Initiator. The Initiator attempts
54 Appendix
Index 55IndexBbest practicessetting up the iSCSI storage area network, 9CCHAP, 35mutual, 37one-way, 36configuringInitiator, 18Initiator (host), 14Init
56 Index
6 Contents
Introduction 7IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target on
8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault Storage SystemThroughout this document,
Introduction 9Before Setting Up the PowerVault Storage Solution as an iSCSI TargetBefore you set up your storage solution as an iSCSI Target, read thi
Commentaires sur ces manuels