Dell PowerVault NX1950 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačový hardware Dell PowerVault NX1950. Dell PowerVault NX1950 User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 70
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
www.dell.com | support.dell.com
Dell™ PowerVault™ NX1950 Systems
End-to-End Deployment Guide for iSCSI
Model EMU01
Zobrazit stránku 0
1 2 3 4 5 6 ... 69 70

Shrnutí obsahu

Strany 1 - Model EMU01

www.dell.com | support.dell.comDell™ PowerVault™ NX1950 SystemsEnd-to-End Deployment Guide for iSCSIModel EMU01

Strany 2 - Notes, Notices, and Cautions

10 Introduction• You can configure Initiators with one or two dedicated NICs for iSCSI, based on your requirement. NOTE: Table 1-1 and Table 1-2 prov

Strany 3 - Contents

Introduction 11• It is a good practice to have two dual-port Network Interface Cards (NICs), with two ports dedicated for iSCSI. Configure each NIC on

Strany 4 - 4 Contents

12 IntroductionFigure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICspublic networkhost (Initiator)PowerVault NX1950 storag

Strany 5 - Using Challenge-Handshake

Introduction 13Figure 1-2. Redundant iSCSI Paths With Three NICspublic networkhost (Initiator)PowerVault NX1950 storage solutionpublic networkiSCSI tr

Strany 6 - 6 Contents

14 IntroductionFigure 1-3. Non-Redundant iSCSI Path With Three NICs NOTE: For 3.0 iSCSI Target—In Figure 1-4 and Figure 1-5, both Initiators can commu

Strany 7 - Introduction

Introduction 15Figure 1-4. Redundant iSCSI Paths Using Four NICspublic networkhost (Initiator)PowerVault NX1950 storage system (cluster node)PowerVaul

Strany 8 - Terms and Definitions

16 IntroductionFigure 1-5. Non-Redundant iSCSI Paths Using Four NICs• For more information about the pre-requisites to configure the PowerVault NX1950

Strany 9 - Introduction 9

Quick Install Steps for Initiator-Target Connection 172Quick Install Steps for Initiator-Target ConnectionThis section is targeted towards advanced us

Strany 10

18 Quick Install Steps for Initiator-Target Connection3If you are using the PowerVault NX1950 cluster solution with a storage array, perform the follo

Strany 11

Quick Install Steps for Initiator-Target Connection 19Configuring iSCSI Connection With the PowerVault NX1950 Storage SolutionCreating the Target 1Fro

Strany 12 - 12 Introduction

Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates

Strany 13

20 Quick Install Steps for Initiator-Target Connection9If you choose the Advanced option, you can select the IQN identifier by performing the followin

Strany 14 - 14 Introduction

Quick Install Steps for Initiator-Target Connection 215The Access screen appears. In the Add option, specify the iSCSI Targets that access the Virtual

Strany 15

22 Quick Install Steps for Initiator-Target Connection3To create a target, follow the instructions in "Creating the Target" on page 19 and t

Strany 16

Quick Install Steps for Initiator-Target Connection 23Verify the iSCSI HA Instance Creation (Optional)1In any PowerVault NX1950 cluster node, go to St

Strany 17 - Initiator-Target Connection

24 Quick Install Steps for Initiator-Target Connection5In the Log On to Target window, click OK.The Ta rg et s tab displays the status of the Target a

Strany 18

Quick Install Steps for Initiator-Target Connection 25Pre-RequisitesBefore you perform iSCSI Target discovery, perform the following steps:1Download t

Strany 19 - Solution

26 Quick Install Steps for Initiator-Target Connection4To create a target, follow the instructions in "Creating the Target" on page 19 and t

Strany 20 - Creating a Virtual Disk

Detailed End-to-End iSCSI Setup 273Detailed End-to-End iSCSI SetupThis section describes the end-to-end iSCSI setup, including settings for the iSCSI

Strany 21

28 Detailed End-to-End iSCSI Setup2Add the newly-created highly available iSCSI instances as a resource group. The newly-created highly available iSCS

Strany 22

Detailed End-to-End iSCSI Setup 293The Microsoft iSCSI Initiator Installation screen appears. The options Initiator Service and Software Initiator are

Strany 23

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power

Strany 24

30 Detailed End-to-End iSCSI SetupConfiguring the Microsoft iSCSI InitiatorAfter the installation is complete, you can use the iSCSI Initiator to mana

Strany 25 - Pre-Requisites

Detailed End-to-End iSCSI Setup 31Figure 3-1. The PowerVault NX1950 Configuration Tasks Window2Launch the PowerVault NX1950 Management Console—When yo

Strany 26

32 Detailed End-to-End iSCSI SetupFigure 3-2. PowerVault NX1950 Management ConsoleIn Figure 3-2, the Scenarios section in the middle pane provides sev

Strany 27 - NX1950 Cluster Solution

Detailed End-to-End iSCSI Setup 33Figure 3-3. Provision Storage WizardbThe Storage Subsystem screen appears and prompts you to select at least one sto

Strany 28 - Configuring iSCSI Devices

34 Detailed End-to-End iSCSI SetupeThe Server Assignment screen appears. Choose the This server only option and click Next. NOTE: The LUN that you ha

Strany 29

Detailed End-to-End iSCSI Setup 35cThe Review Settings and Create Storage screen appears. Review the storage settings and click Create.The Storage pro

Strany 30 - Configuring the Target

36 Detailed End-to-End iSCSI Setup6Configuring NICs for iSCSI traffic in the PowerVault NX1950 storage solution in cluster mode— If you are setting up

Strany 31

Detailed End-to-End iSCSI Setup 37To configure the iSCSI HA instance perform the following steps in all nodes of cluster system: NOTE: To perform thi

Strany 32

38 Detailed End-to-End iSCSI Setup7Perform the following steps to create iSCSI Targets:Figure 3-4. Creating iSCSI Targets NOTE: In the PowerVault NX19

Strany 33

Detailed End-to-End iSCSI Setup 39eIn the iSCSI initiators identifiers screen, enter the iSCSI Qualified Name (IQN) of the iSCSI Initiator. You can ma

Strany 34

4 ContentsMethod 2 (Discovery Using iSNS Server) . . . . . . . . 24Pre-Requisites . . . . . . . . . . . . . . . . . . . 25Configuring Settings Fro

Strany 35

40 Detailed End-to-End iSCSI SetupaRight-click on the Target name to launch the Create Virtual Disk Wizard.bClick Next. The File screen appears.Create

Strany 36

Detailed End-to-End iSCSI Setup 41Configuring DevicesYou can perform all operations related to Virtual Disks (Devices) using the following options in

Strany 37

42 Detailed End-to-End iSCSI Setup2Go to iSCSI Initiator Ta rg et s tab.The IQN of the Targets is listed and status is displayed as Inactive. Select o

Strany 38

Detailed End-to-End iSCSI Setup 43cIn the Advanced Settings window, select the redundant iSCSI IP address of the PowerVault NX1950 storage system.Sele

Strany 39

44 Detailed End-to-End iSCSI SetupcIn the Specify Partition size screen, specify the partition size. Click Next.dIn the Assign Drive Letter or Path sc

Strany 40

Detailed End-to-End iSCSI Setup 45To automate the creation of snapshots and the mounting of iSCSI Virtual Disks for regular backups, you can use the S

Strany 41 - Establishing Connections

46 Detailed End-to-End iSCSI Setup3After making necessary changes, click OK. NOTICE: Although you do not change the default settings, go to Volume→ P

Strany 42

Detailed End-to-End iSCSI Setup 477The Virtual Disks screen appears and displays two options. Include all Virtual Disks (default)Include only the sele

Strany 43 - Configuring iSCSI LUNs

48 Detailed End-to-End iSCSI Setup• Export Snapshot—Use this option to make Snapshot available to a remote system or to take a redundant copy of a Sna

Strany 44 - Multiple Sessions

Detailed End-to-End iSCSI Setup 49• Rollback—Use this option to rollback an iSCSI Virtual Disk to a previous Snapshot. This operation uses the temp di

Strany 45 - Before Creating Snapshots

Contents 54 Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Protocol . . . . . . . . . . . . . 51CHAP vs IPSec . . .

Strany 46 - Scheduling Snapshots

50 Detailed End-to-End iSCSI Setup5If you want to remove Target IQN name entries, go to the Discovery tab and remove the IP address/DNS name of the Po

Strany 47 - Active Snapshots

Secured iSCSI Using Challenge-Handshake Authentication Protocol 514Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Prot

Strany 48

52 Secured iSCSI Using Challenge-Handshake Authentication ProtocolCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers

Strany 49 - From Initiator

Secured iSCSI Using Challenge-Handshake Authentication Protocol 53iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you

Strany 50 - From Target

54 Secured iSCSI Using Challenge-Handshake Authentication ProtocolTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Tar

Strany 51 - Authentication Protocol

Appendix 55AAppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefl

Strany 52 - One-Way CHAP Authentication

56 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha

Strany 53 - Mutual CHAP Authentication

Appendix 57Figure A-2. Discovery Tab in iSCSI Initiator Properties Window NOTE: If you are using the PowerVault NX1950 cluster solution configured wit

Strany 54 - Initiator Settings Continued

58 AppendixTargets TabThe Ta rg e ts tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Ta

Strany 55 - Appendix

Appendix 59If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I

Strany 56 - Discovery Tab

6 ContentsBest Practices for Efficient Storage Management . . . 67Storage Manager for SANs. . . . . . . . . . . . . 67LUN Management for iSCSI Sub

Strany 57

60 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r

Strany 58 - Targets Tab

Appendix 61Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato

Strany 59

62 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:•Go to iSCSI Initiator Properties→ Tar ge ts ta

Strany 60 - Bound Volumes/Devices Tab

Appendix 63Devices TabThe Devices tab of Target Properties screen provides generic device details like the Virtual Disks that are associated with Targ

Strany 61 - Appendix 61

64 Appendix•Round Robin With Subset—The round robin subset policy executes the round robin policy only on paths designated as active. The stand-by pat

Strany 62 - Using the Advanced Option

Appendix 656The End User License Agreement screen appears. Read the agreement and click Agree to install the program.7The Microsoft iSNS Service Setup

Strany 63 - Load Balance Policy

66 AppendixTo configure the iSNS Server, perform the following steps.1Log on to the server where you have installed the iSNS Server 3.0 and go to Star

Strany 64

Appendix 67Best Practices for Efficient Storage ManagementStorage Manager for SANsStorage Manager for SANs is a Microsoft Management Console snap-in t

Strany 65 - Configuring the iSNS Server

68 AppendixRelated LinksFor more information on storage for Microsoft Windows Storage Server 2003 operating systems and iSCSI in particular, see the f

Strany 66

Index 69IndexNumerics3.0 iSCSI Target, 93.1 iSCSI Target, 9CCHAP, 51mutual, 53one-way, 52IInitiatorConfiguring, 18iSCSI, 7iSNS, 8MMicrosoft iSCSI Init

Strany 67 - Storage Manager for SANs

Introduction 71IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target o

Strany 69 - Numerics

8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault NX1950 Storage Solution Vs. PowerVault N

Strany 70 - 70 Index

Introduction 9Active/Passive Vs. Active/Active iSCSIIn a PowerVault NX1950 cluster solution that is configured with a 3.0 iSCSI Target, only one node

Komentáře k této Příručce

Žádné komentáře