Administrator Guide

Changing the iSCSI target authentication........................................................................................................................44
Entering mutual authentication permissions.................................................................................................................... 44
Creating CHAP secrets...................................................................................................................................................... 45
Initiator CHAP secret.................................................................................................................................................... 45
Target CHAP secret......................................................................................................................................................45
Valid characters for CHAP secrets............................................................................................................................. 45
Changing the iSCSI target identification.......................................................................................................................... 45
Changing iSCSI target discovery settings........................................................................................................................46
Configuring the iSCSI host ports.......................................................................................................................................46
Advanced iSCSI host port settings................................................................................................................................... 47
Viewing or ending an iSCSI session...................................................................................................................................47
Viewing iSCSI statistics and setting baseline statistics.................................................................................................. 48
Edit, remove, or rename host topology............................................................................................................................ 48
Chapter 5: Event monitor.............................................................................................................. 50
Enabling or disabling event monitor.................................................................................................................................. 50
Windows......................................................................................................................................................................... 50
Linux................................................................................................................................................................................50
Chapter 6: About your host............................................................................................................ 51
Configuring host access......................................................................................................................................................51
Using the Host Mappings tab.............................................................................................................................................51
Defining a host............................................................................................................................................................... 52
Removing host access........................................................................................................................................................52
Managing host groups........................................................................................................................................................ 53
Creating a host group......................................................................................................................................................... 53
Adding a host to a host group..................................................................................................................................... 53
Removing a host from a host group........................................................................................................................... 53
Moving a host to a different host group.................................................................................................................... 53
Removing a host group.................................................................................................................................................54
Host topology.................................................................................................................................................................54
Starting or stopping the Host Context Agent........................................................................................................... 54
I/O data path protection.................................................................................................................................................... 54
Managing host port identifiers...........................................................................................................................................55
Chapter 7: Disk groups, standard virtual disks, and thin virtual disks................................................. 57
Creating disk groups and virtual disks...............................................................................................................................57
Creating disk groups..................................................................................................................................................... 58
Locating disk group....................................................................................................................................................... 58
Creating standard virtual disks.................................................................................................................................... 59
Changing the virtual disk modification priority...........................................................................................................60
Changing virtual disk cache settings...........................................................................................................................60
Changing segment size of virtual disk......................................................................................................................... 61
Changing the I/O type...................................................................................................................................................61
Thin virtual disks.................................................................................................................................................................. 62
Advantages of thin virtual disks...................................................................................................................................62
Physical vs virtual capacity an a thin virtual disk....................................................................................................... 62
Thin virtual disk requirements and limitations............................................................................................................ 63
Thin virtual disk attributes............................................................................................................................................ 63
Contents
5