Dell PowerVault NX3000 Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Matériel Dell PowerVault NX3000. Dell PowerVault NX3000 User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer

Résumé du contenu

Page 1 - (NAS) Solution

www.dell.com | support.dell.comDell™ PowerVault™Network Attached Storage(NAS) SolutioniSCSI Deployment Guide

Page 2 - Notes, Cautions, and Warnings

10 Introduction• It is a good practice to have two ports dedicated for iSCSI. Configure each NIC (or ports if you have a multiport NIC) on a separate

Page 3 - Contents

Introduction 11Figure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICs NOTE: For a detailed configuration of the iSCSI Targe

Page 4 - 4 Contents

12 IntroductionFigure 1-2. Redundant iSCSI Paths With Three NICs NOTE: For a detailed configuration of the iSCSI Target, see "Target Details"

Page 5

Setup Steps for Initiator-Target Connection 13Setup Steps for Initiator-Target ConnectionThis section provides step-by-step instructions to set up an

Page 6 - 6 Contents

14 Setup Steps for Initiator-Target ConnectionThe following steps guide you through setting up an iSCSI Target and establishing connection from an Ini

Page 7 - Introduction

Setup Steps for Initiator-Target Connection 156The Create iSCSI Target wizard displays the iSCSI Target Identification option. Enter a Name and Descri

Page 8 - Terms and Definitions

16 Setup Steps for Initiator-Target ConnectionfSelect Next. NOTE: IQNs work regardless of the DNS configuration. You can also specify the IP address

Page 9 - Solution as an iSCSI Target

Setup Steps for Initiator-Target Connection 17Log on - Configuring the Initiator-Target Connection From Initiator (Host)1From the iSCSI Initiator (hos

Page 10

18 Setup Steps for Initiator-Target Connection8To initialize and configure the iSCSI device as local drive and perform iSCSI I/O operations, select Co

Page 11

Setup Steps for Initiator-Target Connection 19Setting Up the Target (PowerVault Storage System)1From the PowerVault storage system, go to Start→ Serve

Page 12 - 12 Introduction

Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indica

Page 13 - Connection

20 Setup Steps for Initiator-Target Connection

Page 14 - Creating the Target

Target Details 21Target DetailsThis section describes the end-to-end iSCSI setup, including settings for the iSCSI Initiator, Target, and establishin

Page 15

22 Target Details2Preparing LUNs for use—The PowerVault NAS storage solution runs on a Microsoft Windows® operating system based platform. The steps t

Page 16 - Creating a Virtual Disk

Target Details 234Creating iSCSI Targets—To create an iSCSI Target:Figure 3-1. Creating iSCSI TargetsaIn the PowerVault NAS Management Console, right

Page 17

24 Target Details•Go to Advanced Identifier→ Add→ Add/Edit Identifier→ Identifier Type and select either IQN, DNS Domain Name, IP address, or MAC Addr

Page 18 - Pre-Requisites

Target Details 25dChoose the size for the virtual disk and click Next. For this example, we choose a size of 100 GB from the available 501 GB on this

Page 19

26 Target Details• Create Snapshot—You can take a snapshot of the virtual disk contents at any given instance.• Disk Access—Mount Read/Write (Provisio

Page 20

Target Details 27dIn the Assign Drive Letter or Path screen, assign the driver letter from drop-down menu. Click Next.eIn the Format Partition screen

Page 21 - Target Details

28 Target DetailsSnapshots that are created on the iSCSI Target server are crash consistent. iSCSI snapshots are created using VSS and a storage array

Page 22

Target Details 293After making necessary changes, click OK. CAUTION: Even if you do not change the default settings, go to Volume→ Properties→ Shado

Page 23

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power

Page 24

30 Target Details7The Frequency screen appears and lists the different options namely—Daily, Weekly, Monthly, and On-time only. Choose one option and

Page 25 - Configuring Devices

Target Details 31• Delete snapshot—Select the snapshot that you want to delete, right-click the snapshot and click Delete. NOTE: You cannot delete

Page 26 - Configuring iSCSI LUNs

32 Target DetailsDisconnecting/Cleaning Up iSCSI DevicesThis section describes the procedure for cleanup operations to be performed on iSCSI devices.

Page 27 - Multiple Sessions

Target Details 333To delete a virtual disk, choose the Devices option, right-click on the virtual disk from middle pane, and select Delete Virtual Di

Page 29 - Scheduling Snapshots

Configuring Secured iSCSI Connections Using CHAP 35Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication ProtocolFew security

Page 30 - Active Snapshots

36 Configuring Secured iSCSI Connections Using CHAPCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers sharing a secr

Page 31

Configuring Secured iSCSI Connections Using CHAP 37iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you have enabled CH

Page 32 - From Target

38 Configuring Secured iSCSI Connections Using CHAPTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Target Settings&qu

Page 33 - Target Details 33

Appendix 39AppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefly

Page 34 - 34 Target Details

4 Contents3 Target Details . . . . . . . . . . . . . . . . . . . . 21Setting Up Target IP Addresses in the PowerVault™NAS Storage Solution . . . .

Page 35 - Authentication Protocol

40 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha

Page 36 - One-Way CHAP Authentication

Appendix 41Figure A-2. Discovery Tab in iSCSI Initiator Properties WindowiSNS Servers—You can also perform Target discovery using iSNS servers.Add the

Page 37 - Mutual CHAP Authentication

42 AppendixTargets TabThe Targets tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Target

Page 38 - Initiator Settings Continued

Appendix 43If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I

Page 39 - Appendix

44 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r

Page 40 - Discovery Tab

Appendix 45Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato

Page 41 - Appendix 41

46 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:• Go to iSCSI Initiator Properties→ Tar ge ts t

Page 42 - Targets Tab

Appendix 47Devices TabThe Devices tab of Target Properties screen provides generic device details like the virtual disks that are associated with Targ

Page 43 - Appendix 43

48 AppendixProperties TabThe Properties tab of Target Properties screen provides information about Target Alias, Authentication, Associated Network po

Page 44 - Bound Volumes/Devices Tab

Appendix 49Configuring the iSNS ServeriSNS server performs the automatic discovery of iSCSI Initiators and Targets; after you register them with iSNS

Page 45 - Appendix 45

Contents 5Advanced Configuration Details . . . . . . . . . . . . 45Enabling Multi-Path on the Initiator . . . . . . . . 45Using the Advanced Opti

Page 46 - Using the Advanced Option

50 Appendix2You can use the Discovery Domains feature to group certain Initiators with Targets with specific access:aGo to iSNS Server Properties→ Dis

Page 47 - Devices Tab

Appendix 51Securing data on an iSCSI SAN—To help secure data transfers between the server and the subsystem, configure security for the login sessions

Page 48 - Properties Tab

52 AppendixThe wizard was unable to import one or more virtual disks. Make sure that the files are not in use, and then run the wizard again.• Initiat

Page 49 - Configuring the iSNS Server

Appendix 53server running Microsoft iSCSI Software Target has IP addresses that are not used to communicate with the Initiator. The Initiator attempts

Page 51 - Known Issues

Index 55IndexBbest practicessetting up the iSCSI storage area network, 9CCHAP, 35mutual, 37one-way, 36configuringInitiator, 18Initiator (host), 14Init

Page 52

56 Index

Page 54 - 54 Appendix

Introduction 7IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target on

Page 55 - Index 55

8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault Storage SystemThroughout this document,

Page 56 - 56 Index

Introduction 9Before Setting Up the PowerVault Storage Solution as an iSCSI TargetBefore you set up your storage solution as an iSCSI Target, read thi

Commentaires sur ces manuels

Pas de commentaire