Dell PowerVault NX3100 Instrukcja Użytkownika Strona 1

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Sprzęt komputerowy Dell PowerVault NX3100. Dell PowerVault NX3100 User Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - (NAS) Solution

www.dell.com | support.dell.comDell™ PowerVault™Network Attached Storage(NAS) SolutioniSCSI Deployment Guide

Strona 2 - Notes, Cautions, and Warnings

10 Introduction• It is a good practice to have two ports dedicated for iSCSI. Configure each NIC (or ports if you have a multiport NIC) on a separate

Strona 3 - Contents

Introduction 11Figure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICs NOTE: For a detailed configuration of the iSCSI Targe

Strona 4 - 4 Contents

12 IntroductionFigure 1-2. Redundant iSCSI Paths With Three NICs NOTE: For a detailed configuration of the iSCSI Target, see "Target Details"

Strona 5

Setup Steps for Initiator-Target Connection 13Setup Steps for Initiator-Target ConnectionThis section provides step-by-step instructions to set up an

Strona 6 - 6 Contents

14 Setup Steps for Initiator-Target ConnectionThe following steps guide you through setting up an iSCSI Target and establishing connection from an Ini

Strona 7 - Introduction

Setup Steps for Initiator-Target Connection 156The Create iSCSI Target wizard displays the iSCSI Target Identification option. Enter a Name and Descri

Strona 8 - Terms and Definitions

16 Setup Steps for Initiator-Target ConnectionfSelect Next. NOTE: IQNs work regardless of the DNS configuration. You can also specify the IP address

Strona 9 - Solution as an iSCSI Target

Setup Steps for Initiator-Target Connection 17Log on - Configuring the Initiator-Target Connection From Initiator (Host)1From the iSCSI Initiator (hos

Strona 10

18 Setup Steps for Initiator-Target Connection8To initialize and configure the iSCSI device as local drive and perform iSCSI I/O operations, select Co

Strona 11

Setup Steps for Initiator-Target Connection 19Setting Up the Target (PowerVault Storage System)1From the PowerVault storage system, go to Start→ Serve

Strona 12 - 12 Introduction

Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indica

Strona 13 - Connection

20 Setup Steps for Initiator-Target Connection

Strona 14 - Creating the Target

Target Details 21Target DetailsThis section describes the end-to-end iSCSI setup, including settings for the iSCSI Initiator, Target, and establishin

Strona 15

22 Target Details2Preparing LUNs for use—The PowerVault NAS storage solution runs on a Microsoft Windows® operating system based platform. The steps t

Strona 16 - Creating a Virtual Disk

Target Details 234Creating iSCSI Targets—To create an iSCSI Target:Figure 3-1. Creating iSCSI TargetsaIn the PowerVault NAS Management Console, right

Strona 17

24 Target Details•Go to Advanced Identifier→ Add→ Add/Edit Identifier→ Identifier Type and select either IQN, DNS Domain Name, IP address, or MAC Addr

Strona 18 - Pre-Requisites

Target Details 25dChoose the size for the virtual disk and click Next. For this example, we choose a size of 100 GB from the available 501 GB on this

Strona 19

26 Target Details• Create Snapshot—You can take a snapshot of the virtual disk contents at any given instance.• Disk Access—Mount Read/Write (Provisio

Strona 20

Target Details 27dIn the Assign Drive Letter or Path screen, assign the driver letter from drop-down menu. Click Next.eIn the Format Partition screen

Strona 21 - Target Details

28 Target DetailsSnapshots that are created on the iSCSI Target server are crash consistent. iSCSI snapshots are created using VSS and a storage array

Strona 22

Target Details 293After making necessary changes, click OK. CAUTION: Even if you do not change the default settings, go to Volume→ Properties→ Shado

Strona 23

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power

Strona 24

30 Target Details7The Frequency screen appears and lists the different options namely—Daily, Weekly, Monthly, and On-time only. Choose one option and

Strona 25 - Configuring Devices

Target Details 31• Delete snapshot—Select the snapshot that you want to delete, right-click the snapshot and click Delete. NOTE: You cannot delete

Strona 26 - Configuring iSCSI LUNs

32 Target DetailsDisconnecting/Cleaning Up iSCSI DevicesThis section describes the procedure for cleanup operations to be performed on iSCSI devices.

Strona 27 - Multiple Sessions

Target Details 333To delete a virtual disk, choose the Devices option, right-click on the virtual disk from middle pane, and select Delete Virtual Di

Strona 29 - Scheduling Snapshots

Configuring Secured iSCSI Connections Using CHAP 35Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication ProtocolFew security

Strona 30 - Active Snapshots

36 Configuring Secured iSCSI Connections Using CHAPCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers sharing a secr

Strona 31

Configuring Secured iSCSI Connections Using CHAP 37iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you have enabled CH

Strona 32 - From Target

38 Configuring Secured iSCSI Connections Using CHAPTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Target Settings&qu

Strona 33 - Target Details 33

Appendix 39AppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefly

Strona 34 - 34 Target Details

4 Contents3 Target Details . . . . . . . . . . . . . . . . . . . . 21Setting Up Target IP Addresses in the PowerVault™NAS Storage Solution . . . .

Strona 35 - Authentication Protocol

40 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha

Strona 36 - One-Way CHAP Authentication

Appendix 41Figure A-2. Discovery Tab in iSCSI Initiator Properties WindowiSNS Servers—You can also perform Target discovery using iSNS servers.Add the

Strona 37 - Mutual CHAP Authentication

42 AppendixTargets TabThe Targets tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Target

Strona 38 - Initiator Settings Continued

Appendix 43If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I

Strona 39 - Appendix

44 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r

Strona 40 - Discovery Tab

Appendix 45Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato

Strona 41 - Appendix 41

46 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:• Go to iSCSI Initiator Properties→ Tar ge ts t

Strona 42 - Targets Tab

Appendix 47Devices TabThe Devices tab of Target Properties screen provides generic device details like the virtual disks that are associated with Targ

Strona 43 - Appendix 43

48 AppendixProperties TabThe Properties tab of Target Properties screen provides information about Target Alias, Authentication, Associated Network po

Strona 44 - Bound Volumes/Devices Tab

Appendix 49Configuring the iSNS ServeriSNS server performs the automatic discovery of iSCSI Initiators and Targets; after you register them with iSNS

Strona 45 - Appendix 45

Contents 5Advanced Configuration Details . . . . . . . . . . . . 45Enabling Multi-Path on the Initiator . . . . . . . . 45Using the Advanced Opti

Strona 46 - Using the Advanced Option

50 Appendix2You can use the Discovery Domains feature to group certain Initiators with Targets with specific access:aGo to iSNS Server Properties→ Dis

Strona 47 - Devices Tab

Appendix 51Securing data on an iSCSI SAN—To help secure data transfers between the server and the subsystem, configure security for the login sessions

Strona 48 - Properties Tab

52 AppendixThe wizard was unable to import one or more virtual disks. Make sure that the files are not in use, and then run the wizard again.• Initiat

Strona 49 - Configuring the iSNS Server

Appendix 53server running Microsoft iSCSI Software Target has IP addresses that are not used to communicate with the Initiator. The Initiator attempts

Strona 51 - Known Issues

Index 55IndexBbest practicessetting up the iSCSI storage area network, 9CCHAP, 35mutual, 37one-way, 36configuringInitiator, 18Initiator (host), 14Init

Strona 52

56 Index

Strona 54 - 54 Appendix

Introduction 7IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target on

Strona 55 - Index 55

8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault Storage SystemThroughout this document,

Strona 56 - 56 Index

Introduction 9Before Setting Up the PowerVault Storage Solution as an iSCSI TargetBefore you set up your storage solution as an iSCSI Target, read thi

Komentarze do niniejszej Instrukcji

Brak uwag