Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
Remove hosts from a host group
You can remove all except the last host from a host group. Removing a host from a host group will ungroup the host but will not
delete it.
1. In the Hosts topic, select 1 through 256 hosts to remove from their host group.
2. Select Action > Remove from Host Group. The Remove from Host Group panel opens and lists the hosts to be removed.
3. Click OK. For the selected hosts, the Group value changes to --.
Rename a host group
You can rename a host group.
1. In the Hosts topic, select a host group to rename.
2. Select Action > Rename Host Group. The Rename Host Group panel opens.
3. In the New Host Group Name field, enter a new name for the host group. A host group name is case sensitive and can
have a maximum of 32 bytes. It cannot already exist in the system or include the following: " , . < \
If the name is used by another host group, you are prompted to enter a different name.
4. Click OK. The hosts table is updated.
Remove host groups
You can remove host groups. Removing a host group will ungroup its hosts but will not delete them.
1. In the Hosts topic, select 1 through 32 host groups to remove.
2. Select Action > Remove Host Group. The Remove Host Group panel opens and lists the host groups to be removed.
3. Click OK. For hosts that were in the selected host groups, the Group value changes to --.
Configuring CHAP
For iSCSI, you can use Challenge-Handshake Authentication Protocol (CHAP) to perform authentication between the initiator
and target of a login request. To perform this identification, a database of CHAP records must exist on the initiator and
target. Each CHAP record can specify one name-secret pair to authenticate the initiator only (one-way CHAP) or two pairs to
authenticate both the initiator and the target (mutual CHAP). For a login request from an iSCSI host to a controller iSCSI port,
the host is the initiator and the controller port is the target.
When CHAP is enabled and the storage system is the recipient of a login request from a known originator (initiator), the system
will request a known secret. If the originator supplies the secret, the connection will be allowed.
To enable or disable CHAP for all iSCSI nodes, see Changing host port settings on page 53.
Special considerations apply when CHAP is used in a system with a peer connection, which is used in replication. In a peer
connection, a storage system can act as the originator or recipient of a login request. As the originator, with a valid CHAP
record it can authenticate CHAP even if CHAP is disabled. This is possible because the system will supply the CHAP secret
requested by its peer and the connection will be allowed. For information about setting up CHAP for use in a peer connection
and how CHAP interacts with replication, see Creating a peer connection on page 125.
Add or modify a CHAP record
1. If you intend to use mutual CHAP and need to determine the IQN of a controller iSCSI port, perform the following:
● Select the System topic.
● Select the Rear view.
● Hover the cursor over the iSCSI host port that you intend to use. In the Port Information panel that appears, note the
IQN in the ID field value.
2. In the Hosts topic, select Action > Configure CHAP. The Configure CHAP panel opens with existing CHAP records listed.
3. Select the Enable Authentication (CHAP) checkbox to enable use of CHAP for all iSCSI nodes, then confirm the operation.
Working in the Hosts topic
79