User Manual
Table Of Contents
- Dell PowerVault MD 34XX/38XX Series Storage Arrays Administrator's Guide
- Introduction
- About Your MD Series Storage Array
- Physical Disks, Virtual Disks, And Disk Groups
- Disk Pools
- Thin Virtual Disks
- RAID Levels
- Segment Size
- Virtual Disk Operations
- Disk Group Operations
- RAID Background Operations Priority
- Virtual Disk Migration And Disk Roaming
- Advanced Features
- Multi-Path Software
- Load Balancing
- Monitoring System Performance
- Interpreting Performance Monitor Data
- Viewing Real-time Graphical Performance Monitor Data
- Customizing the Performance Monitor Dashboard
- Specifying Performance Metrics
- Viewing Real-time Textual Performance Monitor
- Saving Real-time Textual Performance Data
- Starting and Stopping Background Performance Monitor
- Viewing Information about the Current Background Performance Monitor Session
- Viewing Current Background Performance Monitor Data
- Saving the Current Background Performance Monitor Data
- Viewing Saved Background Performance Monitor Data
- What are invalid objects in the Performance Monitor?
- Discovering And Managing Your Storage Array
- Out-Of-Band Management
- In-Band Management
- Storage Arrays
- Setting Up Your Storage Array
- Locating Storage Arrays
- Naming Or Renaming Storage Arrays
- Setting A Password
- Adding Or Editing A Comment To An Existing Storage Array
- Removing Storage Arrays
- Enabling Premium Features
- Displaying Failover Alert
- Changing The Cache Settings On The Storage Array
- Changing Expansion Enclosure ID Numbers
- Changing The Enclosure Order
- Configuring Alert Notifications
- Battery Settings
- Setting The Storage Array RAID Controller Module Clocks
- Using iSCSI
- Changing The iSCSI Target Authentication
- Entering Mutual Authentication Permissions
- Creating CHAP Secrets
- Changing The iSCSI Target Identification
- Changing The iSCSI Target Discovery Settings
- Configuring The iSCSI Host Ports
- Advanced iSCSI Host Port Settings
- Viewing Or Ending An iSCSI Session
- Viewing iSCSI Statistics And Setting Baseline Statistics
- Edit, Remove, Or Rename Host Topology
- Event Monitor
- About Your Host
- Disk Groups, Standard Virtual Disks, And Thin Virtual Disks
- Creating Disk Groups And Virtual Disks
- Thin Virtual Disks
- Advantages Of Thin Virtual Disks
- Physical Vs Virtual Capacity On A Thin Virtual Disk
- Thin Virtual Disk Requirements And Limitations
- Thin Volume Attributes
- Thin Virtual Disk States
- Comparison—Types Of Virtual Disks And Copy Services
- Rollback On Thin Virtual Disks
- Initializing A Thin Virtual Disk
- Changing A Thin Virtual Disk To A Standard Virtual Disk
- Choosing An Appropriate Physical Disk Type
- Physical Disk Security With Self Encrypting Disk
- Configuring Hot Spare Physical Disks
- Enclosure Loss Protection
- Drawer Loss Protection
- Host-To-Virtual Disk Mapping
- Creating Host-To-Virtual Disk Mappings
- Modifying And Removing Host-To-Virtual Disk Mapping
- Changing Controller Ownership Of The Virtual Disk
- Removing Host-To-Virtual Disk Mapping
- Changing The RAID Controller Module Ownership Of A Disk Group
- Changing The RAID Level Of A Disk Group
- Removing A Host-To-Virtual Disk Mapping Using Linux DMMP
- Restricted Mappings
- Storage Partitioning
- Disk Group And Virtual Disk Expansion
- Disk Group Migration
- Storage Array Media Scan
- Disk Pools And Disk Pool Virtual Disks
- Difference Between Disk Groups And Disk Pools
- Disk Pool Restrictions
- Creating A Disk Pool Manually
- Automatically Managing The Unconfigured Capacity In Disk Pools
- Locating Physical Disks In A Disk Pool
- Renaming A Disk Pool
- Configuring Alert Notifications For A Disk Pool
- Adding Unassigned Physical Disks To A Disk Pool
- Configuring The Preservation Capacity Of A Disk Pool
- Changing The Modification Priority Of A Disk Pool
- Changing The RAID Controller Module Ownership Of A Disk Pool
- Checking Data Consistency
- Deleting A Disk Pool
- Viewing Storage Array Logical Components And Associated Physical Components
- Secure Disk Pools
- Changing Capacity On Existing Thin Virtual Disks
- Creating A Thin Virtual Disk From A Disk Pool
- Using SSD Cache
- How SSD Cache Works
- Benefits Of SSD Cache
- Choosing SSD Cache Parameters
- SSD Cache Restrictions
- Creating An SSD Cache
- Viewing Physical Components Associated With An SSD Cache
- Locating Physical Disks In An SSD Cache
- Adding Physical Disks To An SSD Cache
- Removing Physical Disks From An SSD Cache
- Suspending Or Resuming SSD Caching
- Changing I/O Type In An SSD Cache
- Renaming An SSD Cache
- Deleting An SSD Cache
- Using The Performance Modeling Tool
- Premium Feature—Snapshot Virtual Disk
- Snapshot Virtual Disk Vs. Snapshot Virtual Disk (Legacy)
- Snapshot Images And Groups
- Snapshot Virtual Disk Read/Write Properties
- Snapshot Groups And Consistency Groups
- Understanding Snapshot Repositories
- Creating Snapshot Images
- Scheduling Snapshot Images
- Performing Snapshot Rollbacks
- Creating A Snapshot Group
- Converting A Snapshot Virtual Disk To Read-Write
- Viewing Associated Physical Components Of An Individual Repository Virtual Disk
- Creating A Consistency Group
- Creating A Snapshot Virtual Disk Of A Snapshot Image
- Snapshot Virtual Disk Limitations
- Creating A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Repository
- Changing The Settings Of A Snapshot Virtual Disk
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Renaming A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Deleting A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk
- Creating A Consistency Group Snapshot Virtual Disk Repository (Manually)
- Disabling A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Re-creating A Snapshot Virtual Disk Or Consistency Group Snapshot Virtual Disk
- Changing The Modification Priority Of An Overall Repository Virtual Disk
- Changing The Media Scan Setting Of An Overall Repository Virtual Disk
- Changing The Pre-read Consistency Check Setting Of An Overall Repository Virtual Disk
- Increasing The Capacity Of An Overall Repository
- Decreasing The Capacity Of The Overall Repository
- Performing A Revive Operation
- Premium Feature—Snapshot Virtual Disks (Legacy)
- Scheduling A Snapshot Virtual Disk
- Creating A Snapshot Virtual Disk Using The Simple Path
- Creating A Snapshot Virtual Disk Using The Advanced Path
- Specifying Snapshot Virtual Disk Names
- Snapshot Repository Capacity
- Re-Creating Snapshot Virtual Disks
- Disabling A Snapshot Virtual Disk
- Re-Creating A Snapshot Virtual Disk
- Premium Feature—Virtual Disk Copy
- Using Virtual Disk Copy With Snapshot Or Snapshot (Legacy) Premium Feature
- Types Of Virtual Disk Copies
- Creating A Virtual Disk Copy For An MSCS Shared Disk
- Virtual Disk Read/Write Permissions
- Virtual Disk Copy Restrictions
- Creating A Virtual Disk Copy
- Preferred RAID Controller Module Ownership
- Failed RAID Controller Module
- Copy Manager
- Copying The Virtual Disk
- Storage Array Performance During Virtual Disk Copy
- Setting Copy Priority
- Stopping A Virtual Disk Copy
- Recopying A Virtual Disk
- Removing Copy Pairs
- Device Mapper Multipath For Linux
- Configuring Asymmetric Logical Unit Access
- Premium Feature—Remote Replication
- About Asynchronous Remote Replication
- Remote Replicated Pairs And Replication Repositories
- Types Of Remote Replication
- Remote Replication Requirements And Restrictions
- Setting Up Remote Replication
- Activating Remote Replication Premium Features
- Deactivating Remote Replication
- Remote Replication Groups
- Replicated Pairs
- Management Firmware Downloads
- Downloading RAID Controller And NVSRAM Packages
- Downloading Both RAID Controller And NVSRAM Firmware
- Downloading Only NVSRAM Firmware
- Downloading Physical Disk Firmware
- Downloading MD3060e Series Expansion Module EMM Firmware
- Self-Monitoring Analysis And Reporting Technology (SMART)
- Media Errors And Unreadable Sectors
- Firmware Inventory
- System Interfaces
- Storage Array Software
- Start-Up Routine
- Device Health Conditions
- Trace Buffers
- Collecting Physical Disk Data
- Event Log
- Recovery Guru
- Storage Array Profile
- Viewing The Physical Associations
- Recovering From An Unresponsive Storage Array Condition
- Locating A Physical Disk
- Locating An Expansion Enclosure
- Capturing The State Information
- SMrepassist Utility
- Unidentified Devices
- Recovering From An Unidentified Storage Array
- Starting Or Restarting The Host Context Agent Software
- Getting Help

4
Using iSCSI
NOTE: The following sections are relevant only to MDxx0i storage arrays that use the iSCSI
protocol.
Changing The iSCSI Target Authentication
To change the iSCSI target authentication:
1. In the AMW, select the Setup tab.
2. Select Manage iSCSI Settings.
The Manage iSCSI Settings window is displayed and by default, the Target Authentication tab is
selected.
3. To change the authentication settings, select:
– None — If you do not require initiator authentication. If you select None, any initiator can access
the target.
– CHAP — To enable an initiator that tries to authenticate the target using Challenge Handshake
Authentication Protocol (CHAP). Define the CHAP secret only if you want to use mutual CHAP
authentication. If you select CHAP, but no CHAP target secret is defined, an error message is
displayed. See Creating CHAP Secrets.
4. To enter the CHAP secret, click CHAP secret.
The Enter Target CHAP Secret dialog is displayed.
5. Enter the Target CHAP secret.
The Target CHAP secret must be at least 12 characters and up to 57 characters.
6. Enter the exact target CHAP secret in Confirm target CHAP secret.
NOTE: If you do not want to create a CHAP secret, you can generate a random CHAP secret
automatically. To generate a random CHAP secret, click Generate Random CHAP Secret.
7. Click OK.
NOTE: You can select the None and CHAP at the same time, for example, when one initiator
may not have CHAP and the other initiator has only CHAP selected.
Entering Mutual Authentication Permissions
Mutual authentication or two-way authentication is a way for a client or a user to verify themselves to a
host server, and for the host server to validate itself to the user. This validation is accomplished in such a
way that both parties are sure of the other’s identity.
To add mutual authentication permissions:
1. In the AMW, select the Setup tab.
2. Select Manage iSCSI Settings.
The Manage iSCSI Settings window is displayed.
61