Users Guide
Table Of Contents
- Contents
- About This Guide
- About Your Storage Array
- Access Virtual Disk
- Out-of-Band and In-Band Management
- Adding Storage Arrays
- Naming Storage Arrays
- Removing Storage Arrays
- Setting Up Your Storage Array
- Storage Array Support Data
- Setting a Password
- Resetting a Password
- Changing Expansion Enclosure ID Numbers
- Configuring Alert Notifications
- Battery Settings
- Starting or Restarting the Host-Agent Software in Windows
- Starting or Restarting the Host-Agent Software in Linux
- Using iSCSI
- Using the iSCSI Tab
- Changing the iSCSI Target Authentication
- Entering Mutual Authentication Permissions
- Changing the iSCSI Target Identification
- Changing the iSCSI Target Discovery (Optional)
- Configuring the MD3000i iSCSI Host Ports
- Viewing or Ending an iSCSI Session
- Viewing iSCSI Statistics and Setting Baseline Statistics
- Edit, Remove, or Rename Host Topology
- Event Monitor
- About Your Host
- Disk Groups and Virtual Disks
- Premium Feature-Snapshot Virtual Disks
- Premium Feature-Virtual Disk Copy
- Premium Feature-32 Partitions
- Firmware Downloads
- Troubleshooting Problems
- Enclosure Hardware Replacement, Maintenance, and Configuration Considerations
- Index

20 Storage Array
6
Configure Host Access — Set up one or more hosts to access the storage
array. See "Configuring Host Access" on page 43 for more information.
7
Configure storage array (2 options)
a
Automatic (Simple) configuration
• Step 1: Automatic Configuration — See "Creating Disk Groups
and Virtual Disks" on page 54 for more information.
• Step 2: Create Host-to-Virtual Disk Mappings — See "Creating
Host-to-Virtual Disk Mappings" on page 60 for more information.
b
Manual (Advanced) configuration
• Step 1: Create Virtual Disks — See "Manual Configuration" on
page 55 for more information.
• Step 2: Configure Hot Spare Physical Disks — See "Manually
Configuring Hot Spares" on page 59 for more information.
8
Manage iSCSI Settings — This option will be present only if your
controllers contain iSCSI host ports.
a
Change Target Authentication — Choose the authentication methods
and permissions (if required) for an initiator to access the target.
b
Enter Mutual Authentication Permissions — If initiators require
mutual authentication, you can enter permissions for the target to
access the initiator.
c
Change Target Identification — Define an alias for the target for easy
identification.
d
Change Target Discovery — Configure parameters for how the target
will be discovered on the network.
9
View and Enable Premium Features (Optional) — You may have
purchased premium features, including snapshot virtual disks and virtual
disk copies. See which premium features are currently available to you and
enable these features if they are currently turned off.
10
Configure Ethernet Management Ports (Optional) — Configure network
parameters for the Ethernet management ports managing a storage array
for out-of-band Ethernet connections.