Dell PowerVault DP500 User Manual

Browse online or download User Manual for Computer hardware Dell PowerVault DP500. Dell PowerVault DP500 User Manual

  • Download
  • Add to my manuals
  • Print

Summary of Contents

Page 1 - End-to-End Deployment Guide

www.dell.com | support.dell.comDell™ PowerVault™ NF500/NF600SystemsEnd-to-End Deployment Guidefor iSCSI

Page 2 - Notes and Notices

10 Introduction2In the Microsoft iSCSI Software Target console, right-click iSCSI Target, and then click Create iSCSI Target. The Welcome to the Creat

Page 3 - Contents

Introduction 11cEnter the value or choose the value through the Browse option, and then click OK.The IQN identifier is displayed in the Advanced Ident

Page 4 - 4 Contents

12 Introduction5The Access screen appears. In the Add option, specify the iSCSI Targets that can access the Virtual Disk that you have created. The Ta

Page 5

Introduction 133In Advanced Settings window, select General tab, and select the following options from drop-down menu and click OK.– Local adapter—Mic

Page 6 - Terminology

14 Introduction NOTE: Do not install the iSNS Server software on Initiator (host) or Target (PowerVault500/PowerVault 600 storage system). Install th

Page 7 - Snapshots

Detailed End-to-End iSCSI Setup 15Detailed End-to-End iSCSI SetupThis section describes the end-to-end iSCSI setup, including settings for the iSCSI I

Page 8 - Connection

16 Detailed End-to-End iSCSI Setup3The Microsoft iSCSI Initiator Installation screen appears. The options Initiator Service and Software Initiator are

Page 9 - Creating the Target

Detailed End-to-End iSCSI Setup 17General TabThe General tab displays the Initiator node name which is the Initiator's iSCSI Qualified Name (IQN)

Page 10

18 Detailed End-to-End iSCSI Setupsystem. If no Target portals are listed, you can add them using the IP address or DNS name of Target server. In the

Page 11 - Creating a Virtual Disk

Detailed End-to-End iSCSI Setup 19Figure 2-3. Targets Tab If you use the Direct Portals option the Discovery tab, the Targets of the IP address that y

Page 12 - Introduction

Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either pot

Page 13 - Pre-Requisites

20 Detailed End-to-End iSCSI Setup3Select Automatically restore this connection when the system boots to ensure continuous connection and to avoid est

Page 14 - From Initiator Server/Client

Detailed End-to-End iSCSI Setup 21Figure 2-5. Persistent Targets Tab Bound Volumes/Devices TabIf a host service or application depends on the availabi

Page 15 - Configuring iSCSI Devices

22 Detailed End-to-End iSCSI SetupFigure 2-6. Bound Volumes/Devices Tab Configuring Microsoft iSCSI Software TargetThe Microsoft iSCSI Software Targe

Page 16

Detailed End-to-End iSCSI Setup 23Configuring the Target1Configure Network Settings on the iSCSI Target device—The PowerVault 500/600 storage system i

Page 17 - Discovery Tab

24 Detailed End-to-End iSCSI SetupThe following steps describe the procedure to create two iSCSI Targets that use two dedicated NICs for iSCSI traffic

Page 18 - Targets Tab

Detailed End-to-End iSCSI Setup 25dYou must associate each iSCSI Target with an iSCSI Initiator. The iSCSI Initiator is the host that requests access

Page 19 - Figure 2-3. Targets Tab

26 Detailed End-to-End iSCSI SetupeIn the iSCSI Initiator identifiers screen, choose the identifier and clickNext.fThe Completing the Create iSCSI Tar

Page 20 - Persistent Targets Tab

Detailed End-to-End iSCSI Setup 27eThe Access screen appears. Click Add and enter the iSCSI Target information.You must associate the Virtual Disk wit

Page 21 - Bound Volumes/Devices Tab

28 Detailed End-to-End iSCSI SetupaChoose this option to enable MPIO and select Advanced.bGo to Advanced Settings→ General tab and select the followin

Page 22

Detailed End-to-End iSCSI Setup 299In the right pane, the iSCSI disk that is Connected is displayed as Unknown Not Initialized and Unallocated.10The W

Page 23 - Configuring the Target

Contents 3Contents1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5Terminology . . . . . . . . . . . . . . . . . . . . . . . . 6iSCS

Page 24

30 Detailed End-to-End iSCSI Setup

Page 25

iSCSI Connections Using Challenge-Handshake Authentication Protocol 31Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication P

Page 26

32 iSCSI Connections Using Challenge-Handshake Authentication ProtocolOne-Way CHAP AuthenticationIn One-Way CHAP authentication, only the iSCSI Target

Page 27 - Establishing Connections

iSCSI Connections Using Challenge-Handshake Authentication Protocol 33iSCSI Initiator Settings1Log in to the Target on which you have enabled CHAP in

Page 28

34 iSCSI Connections Using Challenge-Handshake Authentication ProtocolTarget Settings1Configure the Target settings of CHAP as described in "iSCS

Page 29

Appendix 35AppendixThe previous chapters in this document describe the procedures for basic iSCSI session/connection information. This chapter briefly

Page 30

36 AppendixUsing the Advanced OptionYou can use the Advanced option to perform the following functions:• Go to iSCSI Initiator Properties→ Tar ge ts t

Page 31 - Authentication Protocol

Appendix 37Devices TabThe Devices tab of Target Properties screen provides generic device details like the Virtual Disks that are associated with the

Page 32 - One-Way CHAP Authentication

38 Appendix•Round Robin With Subset—The round robin subset policy executes the round robin policy only on paths designated as active. The stand-by pat

Page 33 - Mutual CHAP Authentication

Appendix 395The Installing Microsoft iSNS Server screen indicates the installation progress. The Microsoft iSNS Installation Program prompts you to ch

Page 34 - Initiator Settings Continued

4 Contents3 Configuring Secured iSCSI Connections Using Challenge-Handshake Authentication Protocol . . . . . . . . . . . . . 31CHAP vs IPSec . . . .

Page 35 - Appendix

40 AppendixTo configure the iSNS Server, perform the following steps.1Log on to the server where you have installed the iSNS Server 3.0 and go to Star

Page 36 - Using the Advanced Option

Appendix 41Best Practices for Efficient Storage ManagementStorage Manager for SANsStorage Manager for SANs is a Microsoft Management Console snap-in t

Page 37 - Load Balance Policy

42 AppendixRelated LinksFor more information on storage for Microsoft Windows Storage Server 2003 operating systems and iSCSI in particular, see the f

Page 38

Index 43IndexCCHAP, 31Mutual CHAP, 33One-Way CHAP, 32IiSCSI, 5Configuring, 15Configuring Target, 22LLoad Balance Policy, 37MMulti-Path, 35PPowerVault

Page 40

Introduction 5IntroductionThis document provides information about configuring the Dell™ PowerVault™ 500 or PowerVault 600 storage system as an Intern

Page 41 - Storage Manager for SANs

6 IntroductionThe following topics are discussed in further sections:• Quick install steps—Instructions about creating an iSCSI Target and establishin

Page 42 - Related Links

Introduction 7You can download and install the iSNS server from the Microsoft website at www.microsoft.com on a separate server that does not have Mic

Page 43 - Index 43

8 Introduction• Snapshots are useful for fast system recovery of files and volumes, in case of accidental data deletion by a user, overwritten data, o

Page 44 - 44 Index

Introduction 9Pre-RequisitesBefore you set up the iSCSI Target, ensure that you perform the following steps:1Download the Microsoft iSCSI Initiator so

Comments to this Manuals

No comments