Dell PowerVault NX1950 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Matériel informatique Dell PowerVault NX1950. Dell PowerVault NX1950 User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 70
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
www.dell.com | support.dell.com
Dell™ PowerVault™ NX1950 Systems
End-to-End Deployment Guide for iSCSI
Model EMU01
Vue de la page 0
1 2 3 4 5 6 ... 69 70

Résumé du contenu

Page 1 - Model EMU01

www.dell.com | support.dell.comDell™ PowerVault™ NX1950 SystemsEnd-to-End Deployment Guide for iSCSIModel EMU01

Page 2 - Notes, Notices, and Cautions

10 Introduction• You can configure Initiators with one or two dedicated NICs for iSCSI, based on your requirement. NOTE: Table 1-1 and Table 1-2 prov

Page 3 - Contents

Introduction 11• It is a good practice to have two dual-port Network Interface Cards (NICs), with two ports dedicated for iSCSI. Configure each NIC on

Page 4 - 4 Contents

12 IntroductionFigure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICspublic networkhost (Initiator)PowerVault NX1950 storag

Page 5 - Using Challenge-Handshake

Introduction 13Figure 1-2. Redundant iSCSI Paths With Three NICspublic networkhost (Initiator)PowerVault NX1950 storage solutionpublic networkiSCSI tr

Page 6 - 6 Contents

14 IntroductionFigure 1-3. Non-Redundant iSCSI Path With Three NICs NOTE: For 3.0 iSCSI Target—In Figure 1-4 and Figure 1-5, both Initiators can commu

Page 7 - Introduction

Introduction 15Figure 1-4. Redundant iSCSI Paths Using Four NICspublic networkhost (Initiator)PowerVault NX1950 storage system (cluster node)PowerVaul

Page 8 - Terms and Definitions

16 IntroductionFigure 1-5. Non-Redundant iSCSI Paths Using Four NICs• For more information about the pre-requisites to configure the PowerVault NX1950

Page 9 - Introduction 9

Quick Install Steps for Initiator-Target Connection 172Quick Install Steps for Initiator-Target ConnectionThis section is targeted towards advanced us

Page 10

18 Quick Install Steps for Initiator-Target Connection3If you are using the PowerVault NX1950 cluster solution with a storage array, perform the follo

Page 11

Quick Install Steps for Initiator-Target Connection 19Configuring iSCSI Connection With the PowerVault NX1950 Storage SolutionCreating the Target 1Fro

Page 12 - 12 Introduction

Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates

Page 13

20 Quick Install Steps for Initiator-Target Connection9If you choose the Advanced option, you can select the IQN identifier by performing the followin

Page 14 - 14 Introduction

Quick Install Steps for Initiator-Target Connection 215The Access screen appears. In the Add option, specify the iSCSI Targets that access the Virtual

Page 15

22 Quick Install Steps for Initiator-Target Connection3To create a target, follow the instructions in "Creating the Target" on page 19 and t

Page 16

Quick Install Steps for Initiator-Target Connection 23Verify the iSCSI HA Instance Creation (Optional)1In any PowerVault NX1950 cluster node, go to St

Page 17 - Initiator-Target Connection

24 Quick Install Steps for Initiator-Target Connection5In the Log On to Target window, click OK.The Ta rg et s tab displays the status of the Target a

Page 18

Quick Install Steps for Initiator-Target Connection 25Pre-RequisitesBefore you perform iSCSI Target discovery, perform the following steps:1Download t

Page 19 - Solution

26 Quick Install Steps for Initiator-Target Connection4To create a target, follow the instructions in "Creating the Target" on page 19 and t

Page 20 - Creating a Virtual Disk

Detailed End-to-End iSCSI Setup 273Detailed End-to-End iSCSI SetupThis section describes the end-to-end iSCSI setup, including settings for the iSCSI

Page 21

28 Detailed End-to-End iSCSI Setup2Add the newly-created highly available iSCSI instances as a resource group. The newly-created highly available iSCS

Page 22

Detailed End-to-End iSCSI Setup 293The Microsoft iSCSI Initiator Installation screen appears. The options Initiator Service and Software Initiator are

Page 23

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power

Page 24

30 Detailed End-to-End iSCSI SetupConfiguring the Microsoft iSCSI InitiatorAfter the installation is complete, you can use the iSCSI Initiator to mana

Page 25 - Pre-Requisites

Detailed End-to-End iSCSI Setup 31Figure 3-1. The PowerVault NX1950 Configuration Tasks Window2Launch the PowerVault NX1950 Management Console—When yo

Page 26

32 Detailed End-to-End iSCSI SetupFigure 3-2. PowerVault NX1950 Management ConsoleIn Figure 3-2, the Scenarios section in the middle pane provides sev

Page 27 - NX1950 Cluster Solution

Detailed End-to-End iSCSI Setup 33Figure 3-3. Provision Storage WizardbThe Storage Subsystem screen appears and prompts you to select at least one sto

Page 28 - Configuring iSCSI Devices

34 Detailed End-to-End iSCSI SetupeThe Server Assignment screen appears. Choose the This server only option and click Next. NOTE: The LUN that you ha

Page 29

Detailed End-to-End iSCSI Setup 35cThe Review Settings and Create Storage screen appears. Review the storage settings and click Create.The Storage pro

Page 30 - Configuring the Target

36 Detailed End-to-End iSCSI Setup6Configuring NICs for iSCSI traffic in the PowerVault NX1950 storage solution in cluster mode— If you are setting up

Page 31

Detailed End-to-End iSCSI Setup 37To configure the iSCSI HA instance perform the following steps in all nodes of cluster system: NOTE: To perform thi

Page 32

38 Detailed End-to-End iSCSI Setup7Perform the following steps to create iSCSI Targets:Figure 3-4. Creating iSCSI Targets NOTE: In the PowerVault NX19

Page 33

Detailed End-to-End iSCSI Setup 39eIn the iSCSI initiators identifiers screen, enter the iSCSI Qualified Name (IQN) of the iSCSI Initiator. You can ma

Page 34

4 ContentsMethod 2 (Discovery Using iSNS Server) . . . . . . . . 24Pre-Requisites . . . . . . . . . . . . . . . . . . . 25Configuring Settings Fro

Page 35

40 Detailed End-to-End iSCSI SetupaRight-click on the Target name to launch the Create Virtual Disk Wizard.bClick Next. The File screen appears.Create

Page 36

Detailed End-to-End iSCSI Setup 41Configuring DevicesYou can perform all operations related to Virtual Disks (Devices) using the following options in

Page 37

42 Detailed End-to-End iSCSI Setup2Go to iSCSI Initiator Ta rg et s tab.The IQN of the Targets is listed and status is displayed as Inactive. Select o

Page 38

Detailed End-to-End iSCSI Setup 43cIn the Advanced Settings window, select the redundant iSCSI IP address of the PowerVault NX1950 storage system.Sele

Page 39

44 Detailed End-to-End iSCSI SetupcIn the Specify Partition size screen, specify the partition size. Click Next.dIn the Assign Drive Letter or Path sc

Page 40

Detailed End-to-End iSCSI Setup 45To automate the creation of snapshots and the mounting of iSCSI Virtual Disks for regular backups, you can use the S

Page 41 - Establishing Connections

46 Detailed End-to-End iSCSI Setup3After making necessary changes, click OK. NOTICE: Although you do not change the default settings, go to Volume→ P

Page 42

Detailed End-to-End iSCSI Setup 477The Virtual Disks screen appears and displays two options. Include all Virtual Disks (default)Include only the sele

Page 43 - Configuring iSCSI LUNs

48 Detailed End-to-End iSCSI Setup• Export Snapshot—Use this option to make Snapshot available to a remote system or to take a redundant copy of a Sna

Page 44 - Multiple Sessions

Detailed End-to-End iSCSI Setup 49• Rollback—Use this option to rollback an iSCSI Virtual Disk to a previous Snapshot. This operation uses the temp di

Page 45 - Before Creating Snapshots

Contents 54 Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Protocol . . . . . . . . . . . . . 51CHAP vs IPSec . . .

Page 46 - Scheduling Snapshots

50 Detailed End-to-End iSCSI Setup5If you want to remove Target IQN name entries, go to the Discovery tab and remove the IP address/DNS name of the Po

Page 47 - Active Snapshots

Secured iSCSI Using Challenge-Handshake Authentication Protocol 514Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Prot

Page 48

52 Secured iSCSI Using Challenge-Handshake Authentication ProtocolCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers

Page 49 - From Initiator

Secured iSCSI Using Challenge-Handshake Authentication Protocol 53iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you

Page 50 - From Target

54 Secured iSCSI Using Challenge-Handshake Authentication ProtocolTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Tar

Page 51 - Authentication Protocol

Appendix 55AAppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefl

Page 52 - One-Way CHAP Authentication

56 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha

Page 53 - Mutual CHAP Authentication

Appendix 57Figure A-2. Discovery Tab in iSCSI Initiator Properties Window NOTE: If you are using the PowerVault NX1950 cluster solution configured wit

Page 54 - Initiator Settings Continued

58 AppendixTargets TabThe Ta rg e ts tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Ta

Page 55 - Appendix

Appendix 59If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I

Page 56 - Discovery Tab

6 ContentsBest Practices for Efficient Storage Management . . . 67Storage Manager for SANs. . . . . . . . . . . . . 67LUN Management for iSCSI Sub

Page 57

60 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r

Page 58 - Targets Tab

Appendix 61Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato

Page 59

62 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:•Go to iSCSI Initiator Properties→ Tar ge ts ta

Page 60 - Bound Volumes/Devices Tab

Appendix 63Devices TabThe Devices tab of Target Properties screen provides generic device details like the Virtual Disks that are associated with Targ

Page 61 - Appendix 61

64 Appendix•Round Robin With Subset—The round robin subset policy executes the round robin policy only on paths designated as active. The stand-by pat

Page 62 - Using the Advanced Option

Appendix 656The End User License Agreement screen appears. Read the agreement and click Agree to install the program.7The Microsoft iSNS Service Setup

Page 63 - Load Balance Policy

66 AppendixTo configure the iSNS Server, perform the following steps.1Log on to the server where you have installed the iSNS Server 3.0 and go to Star

Page 64

Appendix 67Best Practices for Efficient Storage ManagementStorage Manager for SANsStorage Manager for SANs is a Microsoft Management Console snap-in t

Page 65 - Configuring the iSNS Server

68 AppendixRelated LinksFor more information on storage for Microsoft Windows Storage Server 2003 operating systems and iSCSI in particular, see the f

Page 66

Index 69IndexNumerics3.0 iSCSI Target, 93.1 iSCSI Target, 9CCHAP, 51mutual, 53one-way, 52IInitiatorConfiguring, 18iSCSI, 7iSNS, 8MMicrosoft iSCSI Init

Page 67 - Storage Manager for SANs

Introduction 71IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target o

Page 69 - Numerics

8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault NX1950 Storage Solution Vs. PowerVault N

Page 70 - 70 Index

Introduction 9Active/Passive Vs. Active/Active iSCSIIn a PowerVault NX1950 cluster solution that is configured with a 3.0 iSCSI Target, only one node

Commentaires sur ces manuels

Pas de commentaire