Dell PowerVault TL4000 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Computerhardware Dell PowerVault TL4000 herunter. Dell PowerVault TL4000 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 16
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Page 1
Dell™ Model TL2000/TL4000 1GB
iSCSI to SAS bridge iSCSI initiators
Table of Contents
Install the iSCSI Initiator Software (iSCSI-attached Host Servers Only).......................................3
Installing the iSCSI Initiator on a Windows Host Server............................................................3
Installing the iSCSI Initiator on a Linux Host Server..................................................................3
Installing the iSCSI initiator during RHEL 4 installation .........................................................3
Installing the iSCSI initiator after RHEL 4 installation: ...........................................................3
Installing the iSCSI Initiator on a RHEL 5 System.....................................................................4
Installing the iSCSI initiator during RHEL 5 installation: ........................................................4
Installing the iSCSI initiator after RHEL 5 installation: ...........................................................4
Installing the iSCSI initiator after RHEL 5 installation via the command line: ........................4
Installing the iSCSI Initiator on a SLES 9 System .....................................................................4
Installing the iSCSI initiator during SLES 9 installation:.........................................................4
Installing the iSCSI initiator after SLES 9 installation:............................................................4
Installing the iSCSI Initiator on a SLES 10 SP1 System ...........................................................5
Install the iSCSI initiator during SLES 10 SP1 installation:....................................................5
Installing the iSCSI initiator after SLES 10 SP1 installation:..................................................5
Perform Target Discovery from the iSCSI Initiator........................................................................5
Using Windows Server 2003 or Windows Server 2008 GUI version.........................................5
Using Windows Server 2008 Core Version ...............................................................................6
Using Linux Server....................................................................................................................6
Using RHEL 5 or SLES 10 SP1 ................................................................................................6
Configure CHAP Authentication on the Host Server (optional).....................................................7
Using Windows Server 2003 or Windows Server 2008 GUI version.........................................7
Using Windows Server 2008 Core Version ...............................................................................7
Using Linux Server....................................................................................................................8
If you are using RHEL 5 or SLES 10 SP1 .................................................................................8
If you are using SLES10 SP1 via the GUI.................................................................................8
Seitenansicht 0
1 2 3 4 5 6 ... 15 16

Inhaltsverzeichnis

Seite 1 - Table of Contents

Page 1 Dell™ Model TL2000/TL4000 1GB iSCSI to SAS bridge iSCSI initiators Table of Contents Install the iSCSI Initiator Software (iSCSI-attached H

Seite 2

Page 10 ListTargets command to display the target list. <Report_To_PNP> is T, which exposes the LUN to the operating system as a storage devi

Seite 3

Page 11 ******************************************************************************* Guidelines for Configuring Your Network for iSCSI This sect

Seite 4

Page 12 6) To enable use of the Lmhosts file to resolve remote NetBIOS names, select Enable LMHOSTS lookup. 7) To specify the location of the fil

Seite 5 - IPSec is not supported

Page 13 1) From the command line, type in ‘iscsi-ls’ This will list all the iSCSI devices that have sessions opened. Look for the duplicate Drive

Seite 6 - Using RHEL 5 or SLES 10 SP1

Page 14 • Review optimal network setup and configuration settings; see Guidelines for Configuring Your Network for iSCSI. Performing Hardware Mai

Seite 7

Page 15 Reference information Terminology CHAP (Challenge Handshake Authentication Protocol). An optional security protocol used to control acces

Seite 8

Page 16 ____________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction i

Seite 9

Page 2 Connect to the TL2000/TL4000 from the Host Server ...9 If you are using Windo

Seite 10

Page 3 Install the iSCSI Initiator Software (iSCSI-attached Host Servers Only) Your Dell™ Model TL24iSCSIxSAS 1Gb iSCSI to SAS™ bridge requires

Seite 11 - Windows Host Setup

Page 4 NOTE: Depending upon your installation method, the system will ask for the required source to install the package. Installing the iSCSI In

Seite 12 - Linux Host Setup

Page 5 4) When the linux-iscsi module is displayed, select it. 5) Click on Check Dependencies to determine if any dependencies exist. 6) f no de

Seite 13

Page 6 Using Windows Server 2008 Core Version 1) Set the iSCSI initiator service to start automatically: \\<server_name> config msiscsi star

Seite 14

Page 7 Configure CHAP Authentication on the Host Server (optional) Select the set of steps in one of the following sections (Windows or Linux) that

Seite 15 - Reference information

Page 8 Using Linux Server 1) Edit the /etc/iscsi.conf file to add the entries below for each iSCSI target: For example, your edited /etc/iscsi.con

Seite 16 - ____________________

Page 9 2) Click Service Start; then select When Booting. 3) Select Discovered Targets; then select Discovery. 4) Enter the IP address of the por

Kommentare zu diesen Handbüchern

Keine Kommentare