Dell MD3200 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Dell MD3200 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Dell MD3200, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Dell MD3200 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Dell MD3200. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Dell MD3200 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Dell MD3200
- Den Namen des Produzenten und das Produktionsjahr des Geräts Dell MD3200
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Dell MD3200
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Dell MD3200 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Dell MD3200 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Dell finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Dell MD3200 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Dell MD3200, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Dell MD3200 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Dell PowerV ault MD3200 and MD3220 Storage Array s Deployment Guide book.book Page 1 Thur sday, July 18, 2013 5:56 PM[...]

  • Seite 2

    Notes, Cautions, and W arnings NOTE: A NOTE indicates important information that helps you make better use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WAR N IN G : A WARNING indicates a potential for property damage, personal injury , or death. __________________ © [...]

  • Seite 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7 Sy stem Requirements . . . . . . . . . . . . . . . . . . . 7 Management Station Requirements . . . . . . . . . 7 Introduction to Storage Array s . . . . . . . . . . . . . . 8 2 Hardware Installation . . . . . . . . . . . . . . . 11 Planning the Storage Configur ati[...]

  • Seite 4

    4 Contents Console Installation . . . . . . . . . . . . . . . . . 29 Silent Installation . . . . . . . . . . . . . . . . . . 29 Upgrading PowerV ault MD Storage Software . . . . . 30 4 Post Installation T asks . . . . . . . . . . . . . . 31 Before Y ou Begin . . . . . . . . . . . . . . . . . . . . . 31 iSCSI Configuration Wo rksheet . . . . . . . .[...]

  • Seite 5

    Contents 5 5 Uninstalling PowerV ault MD Storage Software . . . . . . . . . . . . . . . . . . 45 Uninstalling MD Storage Software From Windows . . 45 Uninstalling MD Storage Software From Linux . . . . . 46 6 Getting Help . . . . . . . . . . . . . . . . . . . . . . . 47 Locating Y our Sy stem Service T ag . . . . . . . . . . . 47 Contacting Dell . [...]

  • Seite 6

    6 Contents Step 2: Configure t he iSCSI Ports on the Storage Array . . . . . . . . . . . . . . . . . . . . . . . 57 Step 3: Perform T ar get Discovery From the iSCSI Initiator . . . . . . . . . . . . . . . . . . . . 59 Step 4: Configur e Host Access . . . . . . . . . . . . . . 61 Understanding CHAP Authentication . . . . . . . . . . 62 What is CHAP[...]

  • Seite 7

    Introduction 7 1 Introduction This guide provides in formation about deploying Dell P owerV ault MD3200 and Dell P owerV ault MD3220 storage arrays. The deployme nt process includes: • Hardwar e installation • Modular Disk Stora ge Manager (MDSM) software installation • Initial system configuration Other information includes system requ ireme[...]

  • Seite 8

    8 Introduction • Display resolution of 1024x768 with 16 million colors (1280x1024 32-bit recommended). • Microsoft W indows, Red Hat Enterprise Linux, or SUSE Li nux Enterprise Server . NOTE: Supported operating sy stems include both native and guest operating sy stems. NOTE: Supported hypervisors include Micros oft Hyper -V , Citrix XenServer [...]

  • Seite 9

    Introduction 9 Unconfigured capacity comprises physical disks not already assigned to a disk group. When a virtual disk is cr eate d using unconfigur ed capacity , a disk group is automatically created. If the only virtual disk in a disk group is deleted, the disk group is also deleted. F r ee capacity is space in a disk group that is not assigned [...]

  • Seite 10

    10 Introduction book.book Page 10 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 11

    Hardware Installation 11 2 Hardware Installation Be fo re us i ng t hi s g u id e , e n su re t h at y ou rev i ew t he in s tr u ct i on s in th e : • Getting Started Guide —The Getting Started Guide that shipped with the storage array provides informat ion to configur e the initial setup of t he system. • Planning section of the Owner ’ s[...]

  • Seite 12

    12 Hardware Installation Connecting the Storage Array The storage array is connected to a host using two hot-swappable R AID controller modules. The R AID controll er modules ar e identifi ed as R AID controller module 0 and R AID controller module 1. F or more informatio n, see the Getting Started Guide . Each RAID controller module has four SAS I[...]

  • Seite 13

    Hardware Installation 13 Redundant a nd Non-Redundan t Configurations Non-redundant configurations ar e configurations that provide only a single data path from a host to the storage arra y . This type of configuration is only recommended for non-critical data storage. P ath failure from a failed or remove d cable, a fail ed HBA, or a fail ed or r [...]

  • Seite 14

    14 Hardware Installation Figure 2-2. T wo Hosts Connected to a Single Controller Server 1 Server 2 Storage array Corporate, public, or private network book.book Page 14 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 15

    Hardware Installation 15 Figure 2-3. Four Hosts Connected to a Single Controller Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.book Page 15 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 16

    16 Hardware Installation Dual Controller Configurations F igur e 2-4 thro ugh F igure 2-6 show two an d four hosts, each connected to two RAID controller modules. Since each host ha s redundant pa ths, loss of a single path would still allow access to the st orage array through the altern ate path. Figure 2-4. T wo Hosts Connected to T wo Controlle[...]

  • Seite 17

    Hardware Installation 17 Figure 2-5. Four Hosts Connected to T w o Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.book Page 17 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 18

    18 Hardware Installation Figure 2-6. Four Hosts Connected to T wo Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 Server 4 book.book Page 18 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 19

    Hardware Installation 19 F igur e 2-7 shows eight hosts, each co nnected to only one RAID controller module. This configuratio n allows the maximum num ber of hosts that may be connected, but provides no redundancy . Figure 2-7. Eight Hosts Connected to T wo Controllers Server 1 Server 2 Storage array Corporate, public, or private network Server 3 [...]

  • Seite 20

    20 Hardware Installation F igur e 2- 8 and F igure 2-9 show up to fo ur cluster nodes connected to two RAID controller modules. Since each cl uster node has r edundant paths, loss of a single path would still allow a ccess to the storage array through the alternat e path. Figure 2-8. Four Cluster Nodes Connected to T wo Controllers Four cluster nod[...]

  • Seite 21

    Hardware Installation 21 Figure 2-9. Four Cluster Nodes Connected to T wo Controllers Four cluster nodes Storage array Corporate, public, or private network book.book Page 21 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 22

    22 Hardware Installation Cabling PowerV ault MD 1200 Series Expansion Enclosures Y ou can expand the capacity of your P o werV ault MD3200 series storage array by adding P owerV ault MD1200 series expansion enclosur es. Y ou can expand the physical disk pool to a maximum of 120 (or 192, if enabled using the P remium F eature activation) physical di[...]

  • Seite 23

    Hardware Installation 23 a Install the software and drive r pa ckage included on the P owerV ault MD series resource media. F or information about installing the software, see "Installing P owerV ault MD Storage Software" on page 27. b Update the storage array RAID controller module firmware and NVSR AM to the latest versions available at[...]

  • Seite 24

    24 Hardware Installation Expanding With New Po werV aul t MD1200 Series Expa nsion Enclosures P erfo rm the following steps to attach new P owerV ault MD1200 series expansion enclosures to a P owerV ault MD3200 series storage array: 1 Before adding the expansion enclosur e(s), ensur e that the storage array software is installed and is up to date. [...]

  • Seite 25

    Hardware Installation 25 • If the status LEDs are blinking am ber , there is an error that can be viewed using P o werV ault MDSM. • If the status LEDs ar e solid blue, the storage array is ready . c After the storage array is online and ready , turn on any attached host systems. 5 Using MDSM, update all attached expans ion enclosure firmwar e [...]

  • Seite 26

    26 Hardware Installation book.book Page 26 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 27

    Installing PowerV ault MD Storage Software 27 3 Installing PowerV ault MD Storage Software The Dell P owerV ault MD series resource media contains software and drivers for both Linux and Microsoft W indows operating systems. The root of the media contains a readme.txt file covering changes to the software, updates, fixes, patches, and ot her import[...]

  • Seite 28

    28 Installing PowerV ault MD Storage Software • Console Installation—This installation procedure is useful for Linux users who do not want to ins tall an X - W indow environment on their supported Linux platform. • Silent Installation—This instal lation procedure is useful for users who want to cr eate scripted installations. Graphical Inst[...]

  • Seite 29

    Installing PowerV ault MD Storage So ftware 29 NOTE: This option is applicable only to Wind ows client softwa re installation. 7 Confirm the installation location and choose Install . 8 If prompted, r eboot the host server once the installation completes. 9 Start MD Storage Manager and discover the array(s). 10 If applicable, activate an y premium [...]

  • Seite 30

    30 Installing PowerV ault MD Storage Software # md_prereq_install.sh 1 Copy the custom_silent.properties file in th e /win dows folder of the installation medi a or image to a writ able location on the host server . 2 Modify the custom_silent.properti es file to refl ect the featur es, models and installation options to be used. 3 Save the file. 4 [...]

  • Seite 31

    Post Installation T asks 31 4 Post Installation T asks Before using the storage array for th e first time, comp lete the initial configuration tasks in the order shown. These tasks are performed using the MD Storage Manager . NOTE: If Dynamic Host Configurat ion Protocol (DHCP) is not used, initial configuration using the management station must be[...]

  • Seite 32

    32 Post Installation T asks iSCSI Configuration W orksheet The "IPv4 Settings—W orksh eet" on page 33 and "IPv 6 Settings—W orksheet" on page 34 helps you plan your config uration. Recor ding host server and storage array IP addresses at a single location enables you to configure your setup faster and mor e effici ently . &q[...]

  • Seite 33

    Post Installation T asks 33 IPv4 Settings—W orksheet Mutual CHAP Secret T arget CHAP Secret A B host server PowerV ault MD36 x 0i 192.168.131.101 ( In 1 default) 192.168.128.101 (management network port) 192.168.130.102 (I n 0 default) 192.168.131.102 (In 1 default ) 192.168.128.102 (management network port) If you need addi tional spac e for mor[...]

  • Seite 34

    34 Post Installation T asks IPv6 Settings—Worksheet Mutual CHAP T arget CHAP A B If you need addi tional space for more than on e host server , use an addi tional sheet. Link local IP addr ess Routable IP addr ess Subnet prefix Gateway A Host server Host iSCSI port 1 ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . ___ . ___ ___ . ___ . __[...]

  • Seite 35

    Post Installation T asks 35 Configuring iSCSI on Y our Storage Array The following sections contain step-b y-step instructions for configuring iSCSI on your storage array . Howev er , before you begin, it is important to understand where each of these steps occur in relation to your host server or storage array environment. The following table show[...]

  • Seite 36

    36 Post Installation T asks T able 4-2. Host Server Vs. Storage Array NOTE: It is recommended that you use the Po werV ault Modular Disk Configuration Utility (MDCU) for iSCSI configuration. The PowerV ault MDCU wizards guides you through the configuration steps desc ribed abov e. If you want to perform a manual configuration, see "Appendi x?[...]

  • Seite 37

    Post Installation T asks 37 The MDCU performs: • Storage array con figuration • Host configuration Storage Array Configuration Before a host iSCSI init iator and an iSCSI -based storage array can communicate, they must be configured with information such as which IP addresses and authentication method to use. Since iSCSI initiators establish co[...]

  • Seite 38

    38 Post Installation T asks informational message. If you are running the utility on a host which is not connected to the iSCSI–based storage array (or which you do not wish to connect to the array), the inform ational message can be ignored. The task generally involves the following steps: 1 Discover available storage ar ray(s) for connection. 2[...]

  • Seite 39

    Post Installation T asks 39 Configure the Storage Array Using MDCU T o configure the iSCSI-based storage array(s) using the MDCU: 1 Launch the utility (if it is not launched a utomatically) from the server with access to the management port s of the storage arra y(s) to be configured. Fo r W i n d o w s , c l i c k Start  All P rograms [...]

  • Seite 40

    40 Post Installation T asks Guidelines For Configuring Y our Network For iSCSI This section provides ge neral guid elines for setting up your network environment and IP addresses for use with the iSCSI ports on your host server and storage arra y . In or de r for hosts to communicate with management and/or iSCSI ports of storage arrays, local NICs [...]

  • Seite 41

    Post Installation T asks 41 2 Right-click the netw ork connection you want to configu re and select P roperties . 3 On the General tab (for a local area connection) or the Networking tab (for all other connections), select Internet P rotocol (TCP/IP) , and then click P roperties . 4 Select Use the following IP address and enter the IP addr ess, sub[...]

  • Seite 42

    42 Post Installation T asks 7 T o specify the location of the file that you want to import into the Lmhosts file, select Import LMHOSTS and then select the file in the Open dialog box. 8 Enable or disable NetBIOS over TCP/IP . If using Microsof t W indows Se rv er 2008 Cor e V ersion, use the netsh interface command to configure the iSCSI ports on [...]

  • Seite 43

    Post Installation T asks 43 NETWORKING=yes HOSTNAME=mymachine.mycompany.com GATEWAY=255.255.255.0 2 Edit the configuration file for the conn ection you want to configure, either /etc/sysconfig/network-scripts/ifcfg-ethX (for Re d Hat Enterprise Linux) or /etc/sysconfig/network/ifcfg-e th-id- XX:XX:XX:XX:XX (for SUSE Enterprise Linux). BOOTPROTO=sta[...]

  • Seite 44

    44 Post Installation T asks book.book Page 44 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 45

    Uninstalling PowerV ault MD Storage Software 45 5 Uninstalling PowerV ault MD Storage Software Uninstalling MD Storage Software From Windows Use the Change/R emove P rogram feature to uninstall the Modular Disk Storage So ftware (MDSM) from Microsoft W indows operating systems other than Microsoft Wi ndows Server 2008: 1 Double-click Add or R emove[...]

  • Seite 46

    46 Uninstalling PowerV ault MD Storage Software NOTE: By default, MD Storage Manag er is installed in the Program FilesDellMD Storage Software directory . If another directory was used during installation, navigate to that directory before beginning the uninstallation procedure. 2 F rom the installation directory , type the following command and[...]

  • Seite 47

    Getting Help 47 6 Getting Help Locating Y our Sy stem Service T ag Y our system is identified by a uniqu e Express Service Code and Se rvice T ag number . The Express Service Code and Se rvice T ag are found on the front of the system by pulling out the informatio n tag. This information is used by Dell to route support calls to the appropriate per[...]

  • Seite 48

    48 Getting Help Documentation Feedback If you have feedback for this document, write to documentati on_feedba ck@dell. com . Alternatively , you can click on the Fe e d b a c k link in any of the Dell document ation pages, fill up the form, and click Submit to send your feedback. book.book Page 48 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 49

    Appendix—Load Balancing 49 A Appendix—Load Balancing Windows Load Balance Policy Multi-path drivers select the I/O path to a virtual disk through a specific R AID controller modul e. When the multi-path dri ver r eceives a new I /O , the driver tries to find a path to the curr ent R AID controller module that owns the virtual disk. If that path[...]

  • Seite 50

    50 Appendix—Load Balancing Least Queue Dep th With Subset The least queue depth with subset policy is also kn own as the least I/Os, or least requests , policy . Th is policy ro utes the next I/O r equest to a data path that has the least outstanding I/O r equests queued. F or this policy , an I/O reques t is simply a comman d in the queue. The t[...]

  • Seite 51

    Appendix—Load Balancing 51 Changing the Load Balance Policy Using the Windows Server 2008 Disk Management Options 1 Right-click My Computer from the host desktop and select Manage to open the Computer Managemen t window . 2 Click Disk Management to show the list of virtual disks attached to the host. 3 Right-click the virtual disk on whic h you w[...]

  • Seite 52

    52 Appendix—Load Balancing book.book Page 52 Thursday, July 18, 2013 5:5 6 PM[...]

  • Seite 53

    Appendix—Manual Configuration of iSCSI 53 B Appendix—Manual Configuration of iSCSI The following sections contain step-b y-step instructions for configuring iSCSI on your storage array . Howev er , before beginning, it is important to understand where each of these steps occur in relation to your host server or the storage array environme nt. T[...]

  • Seite 54

    54 Appendix—Manual Configuration of iSCSI Step 1: Discover the St orage Array (Out-of-band Management Only) Default Management IPv4 Port Settings By default, the storage array management ports ar e set to Dynamic Host Configuration P rotocol (DHCP). If the co ntrol ler(s) on your storage array is unable to get IP configuration from a DHCP server [...]

  • Seite 55

    Appendix—Manual Configuration of iSCSI 55 4 F inally , add the last thr ee bytes of the MAC addr ess FE80::0200:08FF :FEAA:BBCC. NOTE: This procedure applies to out-of-band management only . If you choose to set up in-band management, you must compl ete this step and then proceed to "Step 8: (Optional) Set Up In-Band Managemen t" on pag[...]

  • Seite 56

    56 Appendix—Manual Configuration of iSCSI After discovery is complete, a confirmation screen is displayed. 3 Click Close to close the screen. Manual Storage Array Discovery 1 Launch MDSM. If this is the first storage array to be set up, the Add New Storage Array window is d isplayed. 2 Select Manual and click OK . 3 Select Out-of -band management[...]

  • Seite 57

    Appendix—Manual Configuration of iSCSI 57 Step 2: Configure the i SCSI Ports on the Storage Array By default, the iSCSI ports on the stor age array ar e set to the following IPv4 settings: Controller 0, Port 0: IP: 192.168.130.101 Subnet Mask: 255.255.255.0 Port: 3260 Controller 0, Port 1: IP: 192.168.131.101 Subnet Mask: 255.255.255.0 Port: 3260[...]

  • Seite 58

    58 Appendix—Manual Configuration of iSCSI Controller 1, Port 2: IP: 192.168.132.102 Subnet Mask: 255.255.255.0 Port: 3260 Controller 1, Port 3: IP: 192.168.133.102 Subnet Mask: 255.255.255.0 Port: 3260 NOTE: No default gateway is set. T o configure the iSCSI ports on th e storage array: 1 F rom MDSM, navigate to the Setup tab on the AMW . 2 Click[...]

  • Seite 59

    Appendix—Manual Configuration of iSCSI 59 Step 3: Perform T arget Discovery From the iSCSI Initiator This step ident ifies the iSCSI por ts on the st orage array to the host server . Select the set of steps in one of the following se ctions (Microsoft W indows or Linux) that corr esponds to your operating system. If you are using Microsoft W indo[...]

  • Seite 60

    60 Appendix—Manual Configuration of iSCSI • If you do not plan to configure CHAP authentication , repeat step 1 thorough step 6 for all iSCSI ports on the storage array . If you are using W indows Server 2008 Cor e V ersio n: 1 Set the iSCSI initiator service to start automatically: sc <server_name> config msiscsi start=auto 2 Start the[...]

  • Seite 61

    Appendix—Manual Configuration of iSCSI 61 5 T o display the available iSCSI targets at the specified IP address, use the following command: iscsiadm –m discovery –t st -p <IP_address_of_iSCSI_port> 6 After target discovery , use the foll owing command to manually log in: iscsiadm -m node –l This login is performed automatically at sta[...]

  • Seite 62

    62 Appendix—Manual Configuration of iSCSI Understanding CHAP Authentication What is CHAP? Challenge Handshak e A uthentication P rotocol (CHAP) is an optional iSCSI authentication method where the storag e arr ay (target) authenticates iSCSI initiators on the host server . T wo types of CHAP are supported: •T a r g e t C H A P •M u t u a l C [...]

  • Seite 63

    Appendix—Manual Configuration of iSCSI 63 CHAP Definitions T o summarize the differences between target CHAP and mutual CHAP authentication, see T able B-3. Step 5: Configure CHAP Authentication on the Storage Array (Optional) If you are configuring CHAP authentication of any kind (either target-only or target and mutual), you must complete this [...]

  • Seite 64

    64 Appendix—Manual Configuration of iSCSI Although the storage array allows size s from 12 to 57 characters, many initiators only support CHAP secret sizes up to 16 char acters (128 -bit). NOTE: A CHAP secret is not retrievable af ter it is entered . Ensure that you record the secret in an accessible place. If Generate Random Secret is used, copy[...]

  • Seite 65

    Appendix—Manual Configuration of iSCSI 65 Step 6: Configure CHAP Authentication on the Host Server (Optional) If you configured CHAP authentica tion in "Step 5: Conf igure CHAP Authenticat ion on the Storage Array (Optional)" on page 63, complete the following steps. If not, skip to "Step 7: Connect to th e T ar get Storage Array F[...]

  • Seite 66

    66 Appendix—Manual Configuration of iSCSI • P erform mutual authentication—If mutual CHAP authentication i s configured, select this option. NOTE: IPSec is not supported. 8 Click OK . If you requ ire a discovery ses sion failover , repeat step 5 and step 6 (in this procedure) for all iSCSI ports on the storage array . Otherwise, single-host p[...]

  • Seite 67

    Appendix—Manual Configuration of iSCSI 67 1 T o enable CHAP (optional), the following line needs to be enabled in yo ur /etc/iscsi/isc sid.conf file: node.session.auth.authmethod = CHAP 2 T o set a user name and password for CHAP authentication of the initiator by the target(s), edit the following lines: node.session.auth.username = <iscsi_ini[...]

  • Seite 68

    68 Appendix—Manual Configuration of iSCSI 7 The final configuration contained in the /etc/iscsi/iscsid.conf file might look like this: node.session.auth.authmethod = CHAP node.session.auth.username = iqn.2005- 03.com.redhat01.78b1b8cad821 node.session.auth.password = password_1 node.session.auth.username_in= iqn.1984- 05.com.dell:powervault.12345[...]

  • Seite 69

    Appendix—Manual Configuration of iSCSI 69 7 Select one: • If you ar e not using CHAP authentica tion, select No Authent ication . Go to step 8. or • I f you are using CHAP authenticati on, enter the CHAP user name and password. T o enable Mutual CHAP , select and enter th e Mutual CHAP user name and p assword. 8 Repeat step 7 for ea ch target[...]

  • Seite 70

    70 Appendix—Manual Configuration of iSCSI • Data Digest and Header Digest —Optionally , you can specify that a digest of data or head er information be compiled during transmission to assist in troubleshooting. • CHAP logon information —If CHAP authentication is re quired, select this option and enter the T arget secret. • P erform mutu[...]

  • Seite 71

    Appendix—Manual Configuration of iSCSI 71 where, – <T arget_Name> is the target name as displayed in the target list. Use the iscsicli ListT argets command to display the target list. – <Report_T o_PNP > is T , which exposes the L UN to the operating system as a storage device. – <T ar get_P ortal_Address> is the IP addres[...]

  • Seite 72

    72 Appendix—Manual Configuration of iSCSI P e rsistent Log inT arget does not initia te a login to the target until after the system is rebooted. T o establish imme diate login to the tar get, substitute LoginT arget for P ersistentL oginT arget. : NOTE: See the Microsoft iSCSI So ftware Initiator 2.x User’ s Guide for more information about th[...]

  • Seite 73

    Appendix—Manual Configuration of iSCSI 73 NOTE: Configure the management stati on you are using for network communication to the same IP subnet as the PowerV ault MD36 x 0i host ports. 1 Establish an iSCSI session to the P owerV ault MD3600i RAID storage array . 2 Restart the SMagent service. 3 Launch MDSM. If this is the first storage array to b[...]

  • Seite 74

    74 Appendix—Manual Configuration of iSCSI book.book Page 74 Thursday, July 18, 2013 5:5 6 PM[...]