Administrator Guide

Table Of Contents
Field Description Shortcut
At 100%, a 20GB volume would consume 40GB of storage space: 20GB for storage
and 20GB for snapshots.
Reported Volume Size Displays the space allocation on the volume. When thin provisioning is enabled, this
eld becomes a space allocating tool outtted with 3 sliding pointer controls colored
purple, yellow, and red, respectively.
Click and drag the pointers to slide them back and forth.
Minimum volume reserve — Species, as a percentage of the volume size, how
much usable space is allocated on the volume.
In-use warning limit — Generates a warning message when the specied
percentage of the minimum volume reserve is consumed. For example, if the
minimum volume reserve is 20GB and the warning limit is 80%, the warning
message will occur when 16GB are consumed (or free space falls below 4GB).
Maximum in-use space — Species the maximum amount of space that can be
allocated on the volume. This default is 100% (the entire volume size), but can
be reduced if desired.
Use the Tab key
to focus on the
reported volume
size bar. The
space bar opens
the Adjust marker
values dialog box.
Estimated changes in
storage pool default
Estimates how the currently proposed volume size and snapshot settings aect the
existing space in the designated storage pool.
None
Table 218. Dene iSCSI Access Points
Field Description Shortcut
What kind of access type do you want for this volume?
Copy access Displays the options for copying access controls from another volume Alt+P
Select or dene access
control policies
Displays the options for dening or selecting an already existing access control
policy
Alt+L
Dene one or more
basic access points
Displays the options for dening one or more basic access points Alt+F
None (do not allow
access)
Denies access to the volume Alt+E
Do you want to allow simultaneous access to this volume from more than one iSCSI initiator?
Yes Allows multiple hosts access to the volume. In a shared storage environment, you
must control computer access to iSCSI targets (volumes and snapshots), because
multiple computers writing to a target in an uncoordinated manner might result in
volume corruption.
Some environments might need multihost access to a target. You can enable
multihost access to a target if you meet any of the following conditions:
Your cluster environment gives the initiators on each cluster computer a
dierent IQN, and the environment can manage multiple connections to a target.
For example, the environment uses a Distributed Lock Manager or SCSI
reservations.
Your multipathing solution does not use the same IQN on all initiators, and you
cannot modify the names to be the same.
You use an environment, such as a virtual server, that can manage multiple
connections to the same iSCSI target (for example, through SCSI reservations).
Initiators on a single computer do not use the same IQN.
No Does not allow simultaneous access to the volume Alt+O
430
Reference: GUI Panels, Wizards, and Dialog Boxes