Administrator Guide

Changing The Enclosure Order........................................................................................................................41
Configuring Alert Notifications...............................................................................................................................41
Configuring E-mail Alerts.................................................................................................................................42
Configuring SNMP Alerts.................................................................................................................................43
Battery Settings......................................................................................................................................................44
Changing The Battery Settings........................................................................................................................44
Setting The Storage Array RAID Controller Module Clocks...................................................................................44
4 Using iSCSI.................................................................................................................................47
Changing The iSCSI Target Authentication............................................................................................................47
Entering Mutual Authentication Permissions.........................................................................................................47
Creating CHAP Secrets...........................................................................................................................................48
Initiator CHAP Secret.......................................................................................................................................48
Target CHAP Secret.........................................................................................................................................48
Valid Characters For CHAP Secrets.................................................................................................................48
Changing The iSCSI Target Identification..............................................................................................................49
Changing The iSCSI Target Discovery Settings.....................................................................................................49
Configuring The iSCSI Host Ports...........................................................................................................................49
Advanced iSCSI Host Port Settings........................................................................................................................50
Viewing Or Ending An iSCSI Session......................................................................................................................51
Viewing iSCSI Statistics And Setting Baseline Statistics.......................................................................................51
Edit, Remove, Or Rename Host Topology...............................................................................................................52
5 Event Monitor.............................................................................................................................53
Enabling Or Disabling The Event Monitor...............................................................................................................53
Windows..........................................................................................................................................................53
Linux.................................................................................................................................................................53
6 About Your Host.........................................................................................................................55
Configuring Host Access........................................................................................................................................55
Using The Host Mappings Tab................................................................................................................................55
Defining A Host.................................................................................................................................................56
Removing Host Access...........................................................................................................................................57
Managing Host Groups...........................................................................................................................................57
Creating A Host Group............................................................................................................................................57
Adding A Host To A Host Group.......................................................................................................................58
Removing A Host From A Host Group...............................................................................................................58
Moving A Host To A Different Host Group.......................................................................................................58
Removing A Host Group...................................................................................................................................58
Host Topology...................................................................................................................................................59
Starting Or Stopping The Host Context Agent..................................................................................................59
I/O Data Path Protection.........................................................................................................................................59