Dell MD3220 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Dell MD3220. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Dell MD3220 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Dell MD3220 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Dell MD3220, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Dell MD3220 должна находится:
- информация относительно технических данных устройства Dell MD3220
- название производителя и год производства оборудования Dell MD3220
- правила обслуживания, настройки и ухода за оборудованием Dell MD3220
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Dell MD3220 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Dell MD3220 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Dell, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Dell MD3220, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Dell MD3220, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Dell MD3220. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    Dell PowerV ault MD3200 and MD3220 Storage Array s Deployment Guide book.book Page 1 Thur sday, July 18, 2013 5:56 PM[...]

  • Страница 2

    Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WAR N IN G : A WARNING indicates a potential for property damage, personal injury , or death. __________________ © [...]

  • Страница 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7 Sy stem Requirements . . . . . . . . . . . . . . . . . . . 7 Management Station Requirements . . . . . . . . . 7 Introduction to Storage Array s . . . . . . . . . . . . . . 8 2 Hardware Installation . . . . . . . . . . . . . . . 11 Planning the Storage Configur ati[...]

  • Страница 4

    4 Contents Console Installation . . . . . . . . . . . . . . . . . 29 Silent Installation . . . . . . . . . . . . . . . . . . 29 Upgrading PowerV ault MD Storage Software . . . . . 30 4 Post Installation T asks . . . . . . . . . . . . . . 31 Before Y ou Begin . . . . . . . . . . . . . . . . . . . . . 31 iSCSI Configuration Wo rksheet . . . . . . . .[...]

  • Страница 5

    Contents 5 5 Uninstalling PowerV ault MD Storage Software . . . . . . . . . . . . . . . . . . 45 Uninstalling MD Storage Software From Windows . . 45 Uninstalling MD Storage Software From Linux . . . . . 46 6 Getting Help . . . . . . . . . . . . . . . . . . . . . . . 47 Locating Y our Sy stem Service T ag . . . . . . . . . . . 47 Contacting Dell . [...]

  • Страница 6

    6 Contents Step 2: Configure t he iSCSI Ports on the Storage Array . . . . . . . . . . . . . . . . . . . . . . . 57 Step 3: Perform T ar get Discovery From the iSCSI Initiator . . . . . . . . . . . . . . . . . . . . 59 Step 4: Configur e Host Access . . . . . . . . . . . . . . 61 Understanding CHAP Authentication . . . . . . . . . . 62 What is CHAP[...]

  • Страница 7

    Introduction 7 1 Introduction This guide provides in formation about deploying Dell P owerV ault MD3200 and Dell P owerV ault MD3220 storage arrays. The deployme nt process includes: • Hardwar e installation • Modular Disk Stora ge Manager (MDSM) software installation • Initial system configuration Other information includes system requ ireme[...]

  • Страница 8

    8 Introduction • Display resolution of 1024x768 with 16 million colors (1280x1024 32-bit recommended). • Microsoft W indows, Red Hat Enterprise Linux, or SUSE Li nux Enterprise Server . NOTE: Supported operating sy stems include both native and guest operating sy stems. NOTE: Supported hypervisors include Micros oft Hyper -V , Citrix XenServer [...]

  • Страница 9

    Introduction 9 Unconfigured capacity comprises physical disks not already assigned to a disk group. When a virtual disk is cr eate d using unconfigur ed capacity , a disk group is automatically created. If the only virtual disk in a disk group is deleted, the disk group is also deleted. F r ee capacity is space in a disk group that is not assigned [...]

  • Страница 10

    10 Introduction book.book Page 10 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 11

    Hardware Installation 11 2 Hardware Installation Be fo re us i ng t hi s g u id e , e n su re t h at y ou rev i ew t he in s tr u ct i on s in th e : • Getting Started Guide —The Getting Started Guide that shipped with the storage array provides informat ion to configur e the initial setup of t he system. • Planning section of the Owner ’ s[...]

  • Страница 12

    12 Hardware Installation Connecting the Storage Array The storage array is connected to a host using two hot-swappable R AID controller modules. The R AID controll er modules ar e identifi ed as R AID controller module 0 and R AID controller module 1. F or more informatio n, see the Getting Started Guide . Each RAID controller module has four SAS I[...]

  • Страница 13

    Hardware Installation 13 Redundant a nd Non-Redundan t Configurations Non-redundant configurations ar e configurations that provide only a single data path from a host to the storage arra y . This type of configuration is only recommended for non-critical data storage. P ath failure from a failed or remove d cable, a fail ed HBA, or a fail ed or r [...]

  • Страница 14

    14 Hardware Installation Figure 2-2. T wo Hosts Connected to a Single Controller Server 1 Server 2 Storage array Corporate, public, or private network book.book Page 14 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 15

    Hardware Installation 15 Figure 2-3. Four Hosts Connected to a Single Controller Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.book Page 15 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 16

    16 Hardware Installation Dual Controller Configurations F igur e 2-4 thro ugh F igure 2-6 show two an d four hosts, each connected to two RAID controller modules. Since each host ha s redundant pa ths, loss of a single path would still allow access to the st orage array through the altern ate path. Figure 2-4. T wo Hosts Connected to T wo Controlle[...]

  • Страница 17

    Hardware Installation 17 Figure 2-5. Four Hosts Connected to T w o Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.book Page 17 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 18

    18 Hardware Installation Figure 2-6. Four Hosts Connected to T wo Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.book Page 18 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 19

    Hardware Installation 19 F igur e 2-7 shows eight hosts, each co nnected to only one RAID controller module. This configuratio n allows the maximum num ber of hosts that may be connected, but provides no redundancy . Figure 2-7. Eight Hosts Connected to T wo Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 [...]

  • Страница 20

    20 Hardware Installation F igur e 2- 8 and F igure 2-9 show up to fo ur cluster nodes connected to two RAID controller modules. Since each cl uster node has r edundant paths, loss of a single path would still allow a ccess to the storage array through the alternat e path. Figure 2-8. Four Cluster Nodes Connected to T wo Controllers Four cluster nod[...]

  • Страница 21

    Hardware Installation 21 Figure 2-9. Four Cluster Nodes Connected to T wo Controllers Four cluster nodes Storage array Corporate, public, or private network book.book Page 21 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 22

    22 Hardware Installation Cabling PowerV ault MD 1200 Series Expansion Enclosures Y ou can expand the capacity of your P o werV ault MD3200 series storage array by adding P owerV ault MD1200 series expansion enclosur es. Y ou can expand the physical disk pool to a maximum of 120 (or 192, if enabled using the P remium F eature activation) physical di[...]

  • Страница 23

    Hardware Installation 23 a Install the software and drive r pa ckage included on the P owerV ault MD series resource media. F or information about installing the software, see "Installing P owerV ault MD Storage Software" on page 27. b Update the storage array RAID controller module firmware and NVSR AM to the latest versions available at[...]

  • Страница 24

    24 Hardware Installation Expanding With New Po werV aul t MD1200 Series Expa nsion Enclosures P erfo rm the following steps to attach new P owerV ault MD1200 series expansion enclosures to a P owerV ault MD3200 series storage array: 1 Before adding the expansion enclosur e(s), ensur e that the storage array software is installed and is up to date. [...]

  • Страница 25

    Hardware Installation 25 • If the status LEDs are blinking am ber , there is an error that can be viewed using P o werV ault MDSM. • If the status LEDs ar e solid blue, the storage array is ready . c After the storage array is online and ready , turn on any attached host systems. 5 Using MDSM, update all attached expans ion enclosure firmwar e [...]

  • Страница 26

    26 Hardware Installation book.book Page 26 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 27

    Installing PowerV ault MD Storage Software 27 3 Installing PowerV ault MD Storage Software The Dell P owerV ault MD series resource media contains software and drivers for both Linux and Microsoft W indows operating systems. The root of the media contains a readme.txt file covering changes to the software, updates, fixes, patches, and ot her import[...]

  • Страница 28

    28 Installing PowerV ault MD Storage Software • Console Installation—This installation procedure is useful for Linux users who do not want to ins tall an X - W indow environment on their supported Linux platform. • Silent Installation—This instal lation procedure is useful for users who want to cr eate scripted installations. Graphical Inst[...]

  • Страница 29

    Installing PowerV ault MD Storage So ftware 29 NOTE: This option is applicable only to Wind ows client softwa re installation. 7 Confirm the installation location and choose Install . 8 If prompted, r eboot the host server once the installation completes. 9 Start MD Storage Manager and discover the array(s). 10 If applicable, activate an y premium [...]

  • Страница 30

    30 Installing PowerV ault MD Storage Software # md_prereq_install.sh 1 Copy the custom_silent.properties file in th e /win dows folder of the installation medi a or image to a writ able location on the host server . 2 Modify the custom_silent.properti es file to refl ect the featur es, models and installation options to be used. 3 Save the file. 4 [...]

  • Страница 31

    Post Installation T asks 31 4 Post Installation T asks Before using the storage array for th e first time, comp lete the initial configuration tasks in the order shown. These tasks are performed using the MD Storage Manager . NOTE: If Dynamic Host Configurat ion Protocol (DHCP) is not used, initial configuration using the management station must be[...]

  • Страница 32

    32 Post Installation T asks iSCSI Configuration W orksheet The "IPv4 Settings—W orksh eet" on page 33 and "IPv 6 Settings—W orksheet" on page 34 helps you plan your config uration. Recor ding host server and storage array IP addresses at a single location enables you to configure your setup faster and mor e effici ently . &q[...]

  • Страница 33

    Post Installation T asks 33 IPv4 Settings—W orksheet Mutual CHAP Secret T arget CHAP Secret A B host server PowerV ault MD36 x 0i 192.168.131.101 ( In 1 default) 192.168.128.101 (management network port) 192.168.130.102 (I n 0 default) 192.168.131.102 (In 1 default ) 192.168.128.102 (management network port) If you need addi tional spac e for mor[...]

  • Страница 34

    34 Post Installation T asks IPv6 Settings—Worksheet Mutual CHAP T arget CHAP A B If you need addi tional space for more than on e host server , use an addi tional sheet. Link local IP addr ess Routable IP addr ess Subnet prefix Gateway A Host server Host iSCSI port 1 ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . __[...]

  • Страница 35

    Post Installation T asks 35 Configuring iSCSI on Y our Storage Array The following sections contain step-b y-step instructions for configuring iSCSI on your storage array . Howev er , before you begin, it is important to understand where each of these steps occur in relation to your host server or storage array environment. The following table show[...]

  • Страница 36

    36 Post Installation T asks T able 4-2. Host Server Vs. Storage Array NOTE: It is recommended that you use the Po werV ault Modular Disk Configuration Utility (MDCU) for iSCSI configuration. The PowerV ault MDCU wizards guides you through the configuration steps desc ribed abov e. If you want to perform a manual configuration, see "Appendi x?[...]

  • Страница 37

    Post Installation T asks 37 The MDCU performs: • Storage array con figuration • Host configuration Storage Array Configuration Before a host iSCSI init iator and an iSCSI -based storage array can communicate, they must be configured with information such as which IP addresses and authentication method to use. Since iSCSI initiators establish co[...]

  • Страница 38

    38 Post Installation T asks informational message. If you are running the utility on a host which is not connected to the iSCSI–based storage array (or which you do not wish to connect to the array), the inform ational message can be ignored. The task generally involves the following steps: 1 Discover available storage ar ray(s) for connection. 2[...]

  • Страница 39

    Post Installation T asks 39 Configure the Storage Array Using MDCU T o configure the iSCSI-based storage array(s) using the MDCU: 1 Launch the utility (if it is not launched a utomatically) from the server with access to the management port s of the storage arra y(s) to be configured. Fo r W i n d o w s , c l i c k Start  All P rograms [...]

  • Страница 40

    40 Post Installation T asks Guidelines For Configuring Y our Network For iSCSI This section provides ge neral guid elines for setting up your network environment and IP addresses for use with the iSCSI ports on your host server and storage arra y . In or de r for hosts to communicate with management and/or iSCSI ports of storage arrays, local NICs [...]

  • Страница 41

    Post Installation T asks 41 2 Right-click the netw ork connection you want to configu re and select P roperties . 3 On the General tab (for a local area connection) or the Networking tab (for all other connections), select Internet P rotocol (TCP/IP) , and then click P roperties . 4 Select Use the following IP address and enter the IP addr ess, sub[...]

  • Страница 42

    42 Post Installation T asks 7 T o specify the location of the file that you want to import into the Lmhosts file, select Import LMHOSTS and then select the file in the Open dialog box. 8 Enable or disable NetBIOS over TCP/IP . If using Microsof t W indows Se rv er 2008 Cor e V ersion, use the netsh interface command to configure the iSCSI ports on [...]

  • Страница 43

    Post Installation T asks 43 NETWORKING=yes HOSTNAME=mymachine.mycompany.com GATEWAY=255.255.255.0 2 Edit the configuration file for the conn ection you want to configure, either /etc/sysconfig/network-scripts/ifcfg-ethX (for Re d Hat Enterprise Linux) or /etc/sysconfig/network/ifcfg-e th-id- XX:XX:XX:XX:XX (for SUSE Enterprise Linux). BOOTPROTO=sta[...]

  • Страница 44

    44 Post Installation T asks book.book Page 44 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 45

    Uninstalling PowerV ault MD Storage Software 45 5 Uninstalling PowerV ault MD Storage Software Uninstalling MD Storage Software From Windows Use the Change/R emove P rogram feature to uninstall the Modular Disk Storage So ftware (MDSM) from Microsoft W indows operating systems other than Microsoft Wi ndows Server 2008: 1 Double-click Add or R emove[...]

  • Страница 46

    46 Uninstalling PowerV ault MD Storage Software NOTE: By default, MD Storage Manag er is installed in the Program FilesDellMD Storage Software directory . If another directory was used during installation, navigate to that directory before beginning the uninstallation procedure. 2 F rom the installation directory , type the following command and[...]

  • Страница 47

    Getting Help 47 6 Getting Help Locating Y our Sy stem Service T ag Y our system is identified by a uniqu e Express Service Code and Se rvice T ag number . The Express Service Code and Se rvice T ag are found on the front of the system by pulling out the informatio n tag. This information is used by Dell to route support calls to the appropriate per[...]

  • Страница 48

    48 Getting Help Documentation Feedback If you have feedback for this document, write to documentati on_feedba ck@dell. com . Alternatively , you can click on the Fe e d b a c k link in any of the Dell document ation pages, fill up the form, and click Submit to send your feedback. book.book Page 48 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 49

    Appendix—Load Balancing 49 A Appendix—Load Balancing Windows Load Balance Policy Multi-path drivers select the I/O path to a virtual disk through a specific R AID controller modul e. When the multi-path dri ver r eceives a new I /O , the driver tries to find a path to the curr ent R AID controller module that owns the virtual disk. If that path[...]

  • Страница 50

    50 Appendix—Load Balancing Least Queue Dep th With Subset The least queue depth with subset policy is also kn own as the least I/Os, or least requests , policy . Th is policy ro utes the next I/O r equest to a data path that has the least outstanding I/O r equests queued. F or this policy , an I/O reques t is simply a comman d in the queue. The t[...]

  • Страница 51

    Appendix—Load Balancing 51 Changing the Load Balance Policy Using the Windows Server 2008 Disk Management Options 1 Right-click My Computer from the host desktop and select Manage to open the Computer Managemen t window . 2 Click Disk Management to show the list of virtual disks attached to the host. 3 Right-click the virtual disk on whic h you w[...]

  • Страница 52

    52 Appendix—Load Balancing book.book Page 52 Thursday, July 18, 2013 5:5 6 PM[...]

  • Страница 53

    Appendix—Manual Configuration of iSCSI 53 B Appendix—Manual Configuration of iSCSI The following sections contain step-b y-step instructions for configuring iSCSI on your storage array . Howev er , before beginning, it is important to understand where each of these steps occur in relation to your host server or the storage array environme nt. T[...]

  • Страница 54

    54 Appendix—Manual Configuration of iSCSI Step 1: Discover the St orage Array (Out-of-band Management Only) Default Management IPv4 Port Settings By default, the storage array management ports ar e set to Dynamic Host Configuration P rotocol (DHCP). If the co ntrol ler(s) on your storage array is unable to get IP configuration from a DHCP server [...]

  • Страница 55

    Appendix—Manual Configuration of iSCSI 55 4 F inally , add the last thr ee bytes of the MAC addr ess FE80::0200:08FF :FEAA:BBCC. NOTE: This procedure applies to out-of-band management only . If you choose to set up in-band management, you must compl ete this step and then proceed to "Step 8: (Optional) Set Up In-Band Managemen t" on pag[...]

  • Страница 56

    56 Appendix—Manual Configuration of iSCSI After discovery is complete, a confirmation screen is displayed. 3 Click Close to close the screen. Manual Storage Array Discovery 1 Launch MDSM. If this is the first storage array to be set up, the Add New Storage Array window is d isplayed. 2 Select Manual and click OK . 3 Select Out-of -band management[...]

  • Страница 57

    Appendix—Manual Configuration of iSCSI 57 Step 2: Configure the i SCSI Ports on the Storage Array By default, the iSCSI ports on the stor age array ar e set to the following IPv4 settings: Controller 0, Port 0: IP: 192.168.130.101 Subnet Mask: 255.255.255.0 Port: 3260 Controller 0, Port 1: IP: 192.168.131.101 Subnet Mask: 255.255.255.0 Port: 3260[...]

  • Страница 58

    58 Appendix—Manual Configuration of iSCSI Controller 1, Port 2: IP: 192.168.132.102 Subnet Mask: 255.255.255.0 Port: 3260 Controller 1, Port 3: IP: 192.168.133.102 Subnet Mask: 255.255.255.0 Port: 3260 NOTE: No default gateway is set. T o configure the iSCSI ports on th e storage array: 1 F rom MDSM, navigate to the Setup tab on the AMW . 2 Click[...]

  • Страница 59

    Appendix—Manual Configuration of iSCSI 59 Step 3: Perform T arget Discovery From the iSCSI Initiator This step ident ifies the iSCSI por ts on the st orage array to the host server . Select the set of steps in one of the following se ctions (Microsoft W indows or Linux) that corr esponds to your operating system. If you are using Microsoft W indo[...]

  • Страница 60

    60 Appendix—Manual Configuration of iSCSI • If you do not plan to configure CHAP authentication , repeat step 1 thorough step 6 for all iSCSI ports on the storage array . If you are using W indows Server 2008 Cor e V ersio n: 1 Set the iSCSI initiator service to start automatically: sc <server_name> config msiscsi start=auto 2 Start the[...]

  • Страница 61

    Appendix—Manual Configuration of iSCSI 61 5 T o display the available iSCSI targets at the specified IP address, use the following command: iscsiadm –m discovery –t st -p <IP_address_of_iSCSI_port> 6 After target discovery , use the foll owing command to manually log in: iscsiadm -m node –l This login is performed automatically at sta[...]

  • Страница 62

    62 Appendix—Manual Configuration of iSCSI Understanding CHAP Authentication What is CHAP? Challenge Handshak e A uthentication P rotocol (CHAP) is an optional iSCSI authentication method where the storag e arr ay (target) authenticates iSCSI initiators on the host server . T wo types of CHAP are supported: •T a r g e t C H A P •M u t u a l C [...]

  • Страница 63

    Appendix—Manual Configuration of iSCSI 63 CHAP Definitions T o summarize the differences between target CHAP and mutual CHAP authentication, see T able B-3. Step 5: Configure CHAP Authentication on the Storage Array (Optional) If you are configuring CHAP authentication of any kind (either target-only or target and mutual), you must complete this [...]

  • Страница 64

    64 Appendix—Manual Configuration of iSCSI Although the storage array allows size s from 12 to 57 characters, many initiators only support CHAP secret sizes up to 16 char acters (128 -bit). NOTE: A CHAP secret is not retrievable af ter it is entered . Ensure that you record the secret in an accessible place. If Generate Random Secret is used, copy[...]

  • Страница 65

    Appendix—Manual Configuration of iSCSI 65 Step 6: Configure CHAP Authentication on the Host Server (Optional) If you configured CHAP authentica tion in "Step 5: Conf igure CHAP Authenticat ion on the Storage Array (Optional)" on page 63, complete the following steps. If not, skip to "Step 7: Connect to th e T ar get Storage Array F[...]

  • Страница 66

    66 Appendix—Manual Configuration of iSCSI • P erform mutual authentication—If mutual CHAP authentication i s configured, select this option. NOTE: IPSec is not supported. 8 Click OK . If you requ ire a discovery ses sion failover , repeat step 5 and step 6 (in this procedure) for all iSCSI ports on the storage array . Otherwise, single-host p[...]

  • Страница 67

    Appendix—Manual Configuration of iSCSI 67 1 T o enable CHAP (optional), the following line needs to be enabled in yo ur /etc/iscsi/isc sid.conf file: node.session.auth.authmethod = CHAP 2 T o set a user name and password for CHAP authentication of the initiator by the target(s), edit the following lines: node.session.auth.username = <iscsi_ini[...]

  • Страница 68

    68 Appendix—Manual Configuration of iSCSI 7 The final configuration contained in the /etc/iscsi/iscsid.conf file might look like this: node.session.auth.authmethod = CHAP node.session.auth.username = iqn.2005- 03.com.redhat01.78b1b8cad821 node.session.auth.password = password_1 node.session.auth.username_in= iqn.1984- 05.com.dell:powervault.12345[...]

  • Страница 69

    Appendix—Manual Configuration of iSCSI 69 7 Select one: • If you ar e not using CHAP authentica tion, select No Authent ication . Go to step 8. or • I f you are using CHAP authenticati on, enter the CHAP user name and password. T o enable Mutual CHAP , select and enter th e Mutual CHAP user name and p assword. 8 Repeat step 7 for ea ch target[...]

  • Страница 70

    70 Appendix—Manual Configuration of iSCSI • Data Digest and Header Digest —Optionally , you can specify that a digest of data or head er information be compiled during transmission to assist in troubleshooting. • CHAP logon information —If CHAP authentication is re quired, select this option and enter the T arget secret. • P erform mutu[...]

  • Страница 71

    Appendix—Manual Configuration of iSCSI 71 where, – <T arget_Name> is the target name as displayed in the target list. Use the iscsicli ListT argets command to display the target list. – <Report_T o_PNP > is T , which exposes the L UN to the operating system as a storage device. – <T ar get_P ortal_Address> is the IP addres[...]

  • Страница 72

    72 Appendix—Manual Configuration of iSCSI P e rsistent Log inT arget does not initia te a login to the target until after the system is rebooted. T o establish imme diate login to the tar get, substitute LoginT arget for P ersistentL oginT arget. : NOTE: See the Microsoft iSCSI So ftware Initiator 2.x User’ s Guide for more information about th[...]

  • Страница 73

    Appendix—Manual Configuration of iSCSI 73 NOTE: Configure the management stati on you are using for network communication to the same IP subnet as the PowerV ault MD36 x 0i host ports. 1 Establish an iSCSI session to the P owerV ault MD3600i RAID storage array . 2 Restart the SMagent service. 3 Launch MDSM. If this is the first storage array to b[...]

  • Страница 74

    74 Appendix—Manual Configuration of iSCSI book.book Page 74 Thursday, July 18, 2013 5:5 6 PM[...]