Dell PowerVault NX1950 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Sprzęt komputerowy Dell PowerVault NX1950. Dell PowerVault NX1950 User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 70
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
www.dell.com | support.dell.com
Dell™ PowerVault™ NX1950 Systems
End-to-End Deployment Guide for iSCSI
Model EMU01
Przeglądanie stron 0
1 2 3 4 5 6 ... 69 70

Podsumowanie treści

Strona 1 - Model EMU01

www.dell.com | support.dell.comDell™ PowerVault™ NX1950 SystemsEnd-to-End Deployment Guide for iSCSIModel EMU01

Strona 2 - Notes, Notices, and Cautions

10 Introduction• You can configure Initiators with one or two dedicated NICs for iSCSI, based on your requirement. NOTE: Table 1-1 and Table 1-2 prov

Strona 3 - Contents

Introduction 11• It is a good practice to have two dual-port Network Interface Cards (NICs), with two ports dedicated for iSCSI. Configure each NIC on

Strona 4 - 4 Contents

12 IntroductionFigure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICspublic networkhost (Initiator)PowerVault NX1950 storag

Strona 5 - Using Challenge-Handshake

Introduction 13Figure 1-2. Redundant iSCSI Paths With Three NICspublic networkhost (Initiator)PowerVault NX1950 storage solutionpublic networkiSCSI tr

Strona 6 - 6 Contents

14 IntroductionFigure 1-3. Non-Redundant iSCSI Path With Three NICs NOTE: For 3.0 iSCSI Target—In Figure 1-4 and Figure 1-5, both Initiators can commu

Strona 7 - Introduction

Introduction 15Figure 1-4. Redundant iSCSI Paths Using Four NICspublic networkhost (Initiator)PowerVault NX1950 storage system (cluster node)PowerVaul

Strona 8 - Terms and Definitions

16 IntroductionFigure 1-5. Non-Redundant iSCSI Paths Using Four NICs• For more information about the pre-requisites to configure the PowerVault NX1950

Strona 9 - Introduction 9

Quick Install Steps for Initiator-Target Connection 172Quick Install Steps for Initiator-Target ConnectionThis section is targeted towards advanced us

Strona 10

18 Quick Install Steps for Initiator-Target Connection3If you are using the PowerVault NX1950 cluster solution with a storage array, perform the follo

Strona 11

Quick Install Steps for Initiator-Target Connection 19Configuring iSCSI Connection With the PowerVault NX1950 Storage SolutionCreating the Target 1Fro

Strona 12 - 12 Introduction

Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates

Strona 13

20 Quick Install Steps for Initiator-Target Connection9If you choose the Advanced option, you can select the IQN identifier by performing the followin

Strona 14 - 14 Introduction

Quick Install Steps for Initiator-Target Connection 215The Access screen appears. In the Add option, specify the iSCSI Targets that access the Virtual

Strona 15

22 Quick Install Steps for Initiator-Target Connection3To create a target, follow the instructions in "Creating the Target" on page 19 and t

Strona 16

Quick Install Steps for Initiator-Target Connection 23Verify the iSCSI HA Instance Creation (Optional)1In any PowerVault NX1950 cluster node, go to St

Strona 17 - Initiator-Target Connection

24 Quick Install Steps for Initiator-Target Connection5In the Log On to Target window, click OK.The Ta rg et s tab displays the status of the Target a

Strona 18

Quick Install Steps for Initiator-Target Connection 25Pre-RequisitesBefore you perform iSCSI Target discovery, perform the following steps:1Download t

Strona 19 - Solution

26 Quick Install Steps for Initiator-Target Connection4To create a target, follow the instructions in "Creating the Target" on page 19 and t

Strona 20 - Creating a Virtual Disk

Detailed End-to-End iSCSI Setup 273Detailed End-to-End iSCSI SetupThis section describes the end-to-end iSCSI setup, including settings for the iSCSI

Strona 21

28 Detailed End-to-End iSCSI Setup2Add the newly-created highly available iSCSI instances as a resource group. The newly-created highly available iSCS

Strona 22

Detailed End-to-End iSCSI Setup 293The Microsoft iSCSI Initiator Installation screen appears. The options Initiator Service and Software Initiator are

Strona 23

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power

Strona 24

30 Detailed End-to-End iSCSI SetupConfiguring the Microsoft iSCSI InitiatorAfter the installation is complete, you can use the iSCSI Initiator to mana

Strona 25 - Pre-Requisites

Detailed End-to-End iSCSI Setup 31Figure 3-1. The PowerVault NX1950 Configuration Tasks Window2Launch the PowerVault NX1950 Management Console—When yo

Strona 26

32 Detailed End-to-End iSCSI SetupFigure 3-2. PowerVault NX1950 Management ConsoleIn Figure 3-2, the Scenarios section in the middle pane provides sev

Strona 27 - NX1950 Cluster Solution

Detailed End-to-End iSCSI Setup 33Figure 3-3. Provision Storage WizardbThe Storage Subsystem screen appears and prompts you to select at least one sto

Strona 28 - Configuring iSCSI Devices

34 Detailed End-to-End iSCSI SetupeThe Server Assignment screen appears. Choose the This server only option and click Next. NOTE: The LUN that you ha

Strona 29

Detailed End-to-End iSCSI Setup 35cThe Review Settings and Create Storage screen appears. Review the storage settings and click Create.The Storage pro

Strona 30 - Configuring the Target

36 Detailed End-to-End iSCSI Setup6Configuring NICs for iSCSI traffic in the PowerVault NX1950 storage solution in cluster mode— If you are setting up

Strona 31

Detailed End-to-End iSCSI Setup 37To configure the iSCSI HA instance perform the following steps in all nodes of cluster system: NOTE: To perform thi

Strona 32

38 Detailed End-to-End iSCSI Setup7Perform the following steps to create iSCSI Targets:Figure 3-4. Creating iSCSI Targets NOTE: In the PowerVault NX19

Strona 33

Detailed End-to-End iSCSI Setup 39eIn the iSCSI initiators identifiers screen, enter the iSCSI Qualified Name (IQN) of the iSCSI Initiator. You can ma

Strona 34

4 ContentsMethod 2 (Discovery Using iSNS Server) . . . . . . . . 24Pre-Requisites . . . . . . . . . . . . . . . . . . . 25Configuring Settings Fro

Strona 35

40 Detailed End-to-End iSCSI SetupaRight-click on the Target name to launch the Create Virtual Disk Wizard.bClick Next. The File screen appears.Create

Strona 36

Detailed End-to-End iSCSI Setup 41Configuring DevicesYou can perform all operations related to Virtual Disks (Devices) using the following options in

Strona 37

42 Detailed End-to-End iSCSI Setup2Go to iSCSI Initiator Ta rg et s tab.The IQN of the Targets is listed and status is displayed as Inactive. Select o

Strona 38

Detailed End-to-End iSCSI Setup 43cIn the Advanced Settings window, select the redundant iSCSI IP address of the PowerVault NX1950 storage system.Sele

Strona 39

44 Detailed End-to-End iSCSI SetupcIn the Specify Partition size screen, specify the partition size. Click Next.dIn the Assign Drive Letter or Path sc

Strona 40

Detailed End-to-End iSCSI Setup 45To automate the creation of snapshots and the mounting of iSCSI Virtual Disks for regular backups, you can use the S

Strona 41 - Establishing Connections

46 Detailed End-to-End iSCSI Setup3After making necessary changes, click OK. NOTICE: Although you do not change the default settings, go to Volume→ P

Strona 42

Detailed End-to-End iSCSI Setup 477The Virtual Disks screen appears and displays two options. Include all Virtual Disks (default)Include only the sele

Strona 43 - Configuring iSCSI LUNs

48 Detailed End-to-End iSCSI Setup• Export Snapshot—Use this option to make Snapshot available to a remote system or to take a redundant copy of a Sna

Strona 44 - Multiple Sessions

Detailed End-to-End iSCSI Setup 49• Rollback—Use this option to rollback an iSCSI Virtual Disk to a previous Snapshot. This operation uses the temp di

Strona 45 - Before Creating Snapshots

Contents 54 Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Protocol . . . . . . . . . . . . . 51CHAP vs IPSec . . .

Strona 46 - Scheduling Snapshots

50 Detailed End-to-End iSCSI Setup5If you want to remove Target IQN name entries, go to the Discovery tab and remove the IP address/DNS name of the Po

Strona 47 - Active Snapshots

Secured iSCSI Using Challenge-Handshake Authentication Protocol 514Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Prot

Strona 48

52 Secured iSCSI Using Challenge-Handshake Authentication ProtocolCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers

Strona 49 - From Initiator

Secured iSCSI Using Challenge-Handshake Authentication Protocol 53iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you

Strona 50 - From Target

54 Secured iSCSI Using Challenge-Handshake Authentication ProtocolTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Tar

Strona 51 - Authentication Protocol

Appendix 55AAppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefl

Strona 52 - One-Way CHAP Authentication

56 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha

Strona 53 - Mutual CHAP Authentication

Appendix 57Figure A-2. Discovery Tab in iSCSI Initiator Properties Window NOTE: If you are using the PowerVault NX1950 cluster solution configured wit

Strona 54 - Initiator Settings Continued

58 AppendixTargets TabThe Ta rg e ts tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Ta

Strona 55 - Appendix

Appendix 59If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I

Strona 56 - Discovery Tab

6 ContentsBest Practices for Efficient Storage Management . . . 67Storage Manager for SANs. . . . . . . . . . . . . 67LUN Management for iSCSI Sub

Strona 57

60 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r

Strona 58 - Targets Tab

Appendix 61Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato

Strona 59

62 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:•Go to iSCSI Initiator Properties→ Tar ge ts ta

Strona 60 - Bound Volumes/Devices Tab

Appendix 63Devices TabThe Devices tab of Target Properties screen provides generic device details like the Virtual Disks that are associated with Targ

Strona 61 - Appendix 61

64 Appendix•Round Robin With Subset—The round robin subset policy executes the round robin policy only on paths designated as active. The stand-by pat

Strona 62 - Using the Advanced Option

Appendix 656The End User License Agreement screen appears. Read the agreement and click Agree to install the program.7The Microsoft iSNS Service Setup

Strona 63 - Load Balance Policy

66 AppendixTo configure the iSNS Server, perform the following steps.1Log on to the server where you have installed the iSNS Server 3.0 and go to Star

Strona 64

Appendix 67Best Practices for Efficient Storage ManagementStorage Manager for SANsStorage Manager for SANs is a Microsoft Management Console snap-in t

Strona 65 - Configuring the iSNS Server

68 AppendixRelated LinksFor more information on storage for Microsoft Windows Storage Server 2003 operating systems and iSCSI in particular, see the f

Strona 66

Index 69IndexNumerics3.0 iSCSI Target, 93.1 iSCSI Target, 9CCHAP, 51mutual, 53one-way, 52IInitiatorConfiguring, 18iSCSI, 7iSNS, 8MMicrosoft iSCSI Init

Strona 67 - Storage Manager for SANs

Introduction 71IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target o

Strona 69 - Numerics

8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault NX1950 Storage Solution Vs. PowerVault N

Strona 70 - 70 Index

Introduction 9Active/Passive Vs. Active/Active iSCSIIn a PowerVault NX1950 cluster solution that is configured with a 3.0 iSCSI Target, only one node

Komentarze do niniejszej Instrukcji

Brak uwag