Dell PowerVault NX1950 Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerhardware Dell PowerVault NX1950 herunter. Dell PowerVault NX1950 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 70
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
www.dell.com | support.dell.com
Dell™ PowerVault™ NX1950 Systems
End-to-End Deployment Guide for iSCSI
Model EMU01
Seitenansicht 0
1 2 3 4 5 6 ... 69 70

Inhaltsverzeichnis

Seite 1 - Model EMU01

www.dell.com | support.dell.comDell™ PowerVault™ NX1950 SystemsEnd-to-End Deployment Guide for iSCSIModel EMU01

Seite 2 - Notes, Notices, and Cautions

10 Introduction• You can configure Initiators with one or two dedicated NICs for iSCSI, based on your requirement. NOTE: Table 1-1 and Table 1-2 prov

Seite 3 - Contents

Introduction 11• It is a good practice to have two dual-port Network Interface Cards (NICs), with two ports dedicated for iSCSI. Configure each NIC on

Seite 4 - 4 Contents

12 IntroductionFigure 1-1. Redundant iSCSI Paths and NIC Teaming for Data Sharing With Four NICspublic networkhost (Initiator)PowerVault NX1950 storag

Seite 5 - Using Challenge-Handshake

Introduction 13Figure 1-2. Redundant iSCSI Paths With Three NICspublic networkhost (Initiator)PowerVault NX1950 storage solutionpublic networkiSCSI tr

Seite 6 - 6 Contents

14 IntroductionFigure 1-3. Non-Redundant iSCSI Path With Three NICs NOTE: For 3.0 iSCSI Target—In Figure 1-4 and Figure 1-5, both Initiators can commu

Seite 7 - Introduction

Introduction 15Figure 1-4. Redundant iSCSI Paths Using Four NICspublic networkhost (Initiator)PowerVault NX1950 storage system (cluster node)PowerVaul

Seite 8 - Terms and Definitions

16 IntroductionFigure 1-5. Non-Redundant iSCSI Paths Using Four NICs• For more information about the pre-requisites to configure the PowerVault NX1950

Seite 9 - Introduction 9

Quick Install Steps for Initiator-Target Connection 172Quick Install Steps for Initiator-Target ConnectionThis section is targeted towards advanced us

Seite 10

18 Quick Install Steps for Initiator-Target Connection3If you are using the PowerVault NX1950 cluster solution with a storage array, perform the follo

Seite 11

Quick Install Steps for Initiator-Target Connection 19Configuring iSCSI Connection With the PowerVault NX1950 Storage SolutionCreating the Target 1Fro

Seite 12 - 12 Introduction

Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates

Seite 13

20 Quick Install Steps for Initiator-Target Connection9If you choose the Advanced option, you can select the IQN identifier by performing the followin

Seite 14 - 14 Introduction

Quick Install Steps for Initiator-Target Connection 215The Access screen appears. In the Add option, specify the iSCSI Targets that access the Virtual

Seite 15

22 Quick Install Steps for Initiator-Target Connection3To create a target, follow the instructions in "Creating the Target" on page 19 and t

Seite 16

Quick Install Steps for Initiator-Target Connection 23Verify the iSCSI HA Instance Creation (Optional)1In any PowerVault NX1950 cluster node, go to St

Seite 17 - Initiator-Target Connection

24 Quick Install Steps for Initiator-Target Connection5In the Log On to Target window, click OK.The Ta rg et s tab displays the status of the Target a

Seite 18

Quick Install Steps for Initiator-Target Connection 25Pre-RequisitesBefore you perform iSCSI Target discovery, perform the following steps:1Download t

Seite 19 - Solution

26 Quick Install Steps for Initiator-Target Connection4To create a target, follow the instructions in "Creating the Target" on page 19 and t

Seite 20 - Creating a Virtual Disk

Detailed End-to-End iSCSI Setup 273Detailed End-to-End iSCSI SetupThis section describes the end-to-end iSCSI setup, including settings for the iSCSI

Seite 21

28 Detailed End-to-End iSCSI Setup2Add the newly-created highly available iSCSI instances as a resource group. The newly-created highly available iSCS

Seite 22

Detailed End-to-End iSCSI Setup 293The Microsoft iSCSI Initiator Installation screen appears. The options Initiator Service and Software Initiator are

Seite 23

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 7Terms and Definitions . . . . . . . . . . . . . . . . . . . 8Power

Seite 24

30 Detailed End-to-End iSCSI SetupConfiguring the Microsoft iSCSI InitiatorAfter the installation is complete, you can use the iSCSI Initiator to mana

Seite 25 - Pre-Requisites

Detailed End-to-End iSCSI Setup 31Figure 3-1. The PowerVault NX1950 Configuration Tasks Window2Launch the PowerVault NX1950 Management Console—When yo

Seite 26

32 Detailed End-to-End iSCSI SetupFigure 3-2. PowerVault NX1950 Management ConsoleIn Figure 3-2, the Scenarios section in the middle pane provides sev

Seite 27 - NX1950 Cluster Solution

Detailed End-to-End iSCSI Setup 33Figure 3-3. Provision Storage WizardbThe Storage Subsystem screen appears and prompts you to select at least one sto

Seite 28 - Configuring iSCSI Devices

34 Detailed End-to-End iSCSI SetupeThe Server Assignment screen appears. Choose the This server only option and click Next. NOTE: The LUN that you ha

Seite 29

Detailed End-to-End iSCSI Setup 35cThe Review Settings and Create Storage screen appears. Review the storage settings and click Create.The Storage pro

Seite 30 - Configuring the Target

36 Detailed End-to-End iSCSI Setup6Configuring NICs for iSCSI traffic in the PowerVault NX1950 storage solution in cluster mode— If you are setting up

Seite 31

Detailed End-to-End iSCSI Setup 37To configure the iSCSI HA instance perform the following steps in all nodes of cluster system: NOTE: To perform thi

Seite 32

38 Detailed End-to-End iSCSI Setup7Perform the following steps to create iSCSI Targets:Figure 3-4. Creating iSCSI Targets NOTE: In the PowerVault NX19

Seite 33

Detailed End-to-End iSCSI Setup 39eIn the iSCSI initiators identifiers screen, enter the iSCSI Qualified Name (IQN) of the iSCSI Initiator. You can ma

Seite 34

4 ContentsMethod 2 (Discovery Using iSNS Server) . . . . . . . . 24Pre-Requisites . . . . . . . . . . . . . . . . . . . 25Configuring Settings Fro

Seite 35

40 Detailed End-to-End iSCSI SetupaRight-click on the Target name to launch the Create Virtual Disk Wizard.bClick Next. The File screen appears.Create

Seite 36

Detailed End-to-End iSCSI Setup 41Configuring DevicesYou can perform all operations related to Virtual Disks (Devices) using the following options in

Seite 37

42 Detailed End-to-End iSCSI Setup2Go to iSCSI Initiator Ta rg et s tab.The IQN of the Targets is listed and status is displayed as Inactive. Select o

Seite 38

Detailed End-to-End iSCSI Setup 43cIn the Advanced Settings window, select the redundant iSCSI IP address of the PowerVault NX1950 storage system.Sele

Seite 39

44 Detailed End-to-End iSCSI SetupcIn the Specify Partition size screen, specify the partition size. Click Next.dIn the Assign Drive Letter or Path sc

Seite 40

Detailed End-to-End iSCSI Setup 45To automate the creation of snapshots and the mounting of iSCSI Virtual Disks for regular backups, you can use the S

Seite 41 - Establishing Connections

46 Detailed End-to-End iSCSI Setup3After making necessary changes, click OK. NOTICE: Although you do not change the default settings, go to Volume→ P

Seite 42

Detailed End-to-End iSCSI Setup 477The Virtual Disks screen appears and displays two options. Include all Virtual Disks (default)Include only the sele

Seite 43 - Configuring iSCSI LUNs

48 Detailed End-to-End iSCSI Setup• Export Snapshot—Use this option to make Snapshot available to a remote system or to take a redundant copy of a Sna

Seite 44 - Multiple Sessions

Detailed End-to-End iSCSI Setup 49• Rollback—Use this option to rollback an iSCSI Virtual Disk to a previous Snapshot. This operation uses the temp di

Seite 45 - Before Creating Snapshots

Contents 54 Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Protocol . . . . . . . . . . . . . 51CHAP vs IPSec . . .

Seite 46 - Scheduling Snapshots

50 Detailed End-to-End iSCSI Setup5If you want to remove Target IQN name entries, go to the Discovery tab and remove the IP address/DNS name of the Po

Seite 47 - Active Snapshots

Secured iSCSI Using Challenge-Handshake Authentication Protocol 514Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Prot

Seite 48

52 Secured iSCSI Using Challenge-Handshake Authentication ProtocolCHAP vs IPSecCHAP authenticates the peer of a connection and is based upon the peers

Seite 49 - From Initiator

Secured iSCSI Using Challenge-Handshake Authentication Protocol 53iSCSI Initiator Settings1Go to the Discovery tab.2Log in to the Target on which you

Seite 50 - From Target

54 Secured iSCSI Using Challenge-Handshake Authentication ProtocolTarget SettingsConfigure the Target settings of CHAP as described in "iSCSI Tar

Seite 51 - Authentication Protocol

Appendix 55AAppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefl

Seite 52 - One-Way CHAP Authentication

56 AppendixFigure A-1. General Tab in iSCSI Initiator Properties WindowThe General tab includes three options namely—Change, Secret and Tun ne l.• Cha

Seite 53 - Mutual CHAP Authentication

Appendix 57Figure A-2. Discovery Tab in iSCSI Initiator Properties Window NOTE: If you are using the PowerVault NX1950 cluster solution configured wit

Seite 54 - Initiator Settings Continued

58 AppendixTargets TabThe Ta rg e ts tab provides the list of individual Targets available to the iSCSI Initiator. In the following example, three Ta

Seite 55 - Appendix

Appendix 59If multiple-paths to the Target are available, then you must describe each path to the iSCSI Initiator. To describe multiple paths to the I

Seite 56 - Discovery Tab

6 ContentsBest Practices for Efficient Storage Management . . . 67Storage Manager for SANs. . . . . . . . . . . . . 67LUN Management for iSCSI Sub

Seite 57

60 AppendixPersistent Targets TabYou can configure Persistent Targets so that the connection to the Target is automatically restored when the system r

Seite 58 - Targets Tab

Appendix 61Figure A-6. Bound Volumes/Devices Tab in iSCSI Initiator Properties WindowAdvanced Configuration DetailsEnabling Multi-Path on the Initiato

Seite 59

62 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:•Go to iSCSI Initiator Properties→ Tar ge ts ta

Seite 60 - Bound Volumes/Devices Tab

Appendix 63Devices TabThe Devices tab of Target Properties screen provides generic device details like the Virtual Disks that are associated with Targ

Seite 61 - Appendix 61

64 Appendix•Round Robin With Subset—The round robin subset policy executes the round robin policy only on paths designated as active. The stand-by pat

Seite 62 - Using the Advanced Option

Appendix 656The End User License Agreement screen appears. Read the agreement and click Agree to install the program.7The Microsoft iSNS Service Setup

Seite 63 - Load Balance Policy

66 AppendixTo configure the iSNS Server, perform the following steps.1Log on to the server where you have installed the iSNS Server 3.0 and go to Star

Seite 64

Appendix 67Best Practices for Efficient Storage ManagementStorage Manager for SANsStorage Manager for SANs is a Microsoft Management Console snap-in t

Seite 65 - Configuring the iSNS Server

68 AppendixRelated LinksFor more information on storage for Microsoft Windows Storage Server 2003 operating systems and iSCSI in particular, see the f

Seite 66

Index 69IndexNumerics3.0 iSCSI Target, 93.1 iSCSI Target, 9CCHAP, 51mutual, 53one-way, 52IInitiatorConfiguring, 18iSCSI, 7iSNS, 8MMicrosoft iSCSI Init

Seite 67 - Storage Manager for SANs

Introduction 71IntroductionThis document provides information about configuring the Internet Small Computer System Interface (iSCSI) Software Target o

Seite 69 - Numerics

8 IntroductionTerms and DefinitionsThe following sections describe the terms used in this document.PowerVault NX1950 Storage Solution Vs. PowerVault N

Seite 70 - 70 Index

Introduction 9Active/Passive Vs. Active/Active iSCSIIn a PowerVault NX1950 cluster solution that is configured with a 3.0 iSCSI Target, only one node

Kommentare zu diesen Handbüchern

Keine Kommentare