SANRAD I3.1.1205 User Manual
Page 17

Table of Contents
xi
Figure 5-2.
Re-routing Storage Access with Off-line V-Switch ...................................................... 5-4
Figure 5-3.
Cluster with Neighbor IP Addresses............................................................................ 5-7
Figure 6-1.
Physical Storage used in Examples ............................................................................ 6-2
Figure 6-2.
Transparent Volume 1 ................................................................................................. 6-7
Figure 6-3.
Partitioning a Physical Volume .................................................................................... 6-8
Figure 6-4.
Disk 1 before Subdisk.................................................................................................. 6-9
Figure 6-5.
Disk 1 with 1 Subdisk................................................................................................. 6-10
Figure 6-6.
Disk 1 with 2 Subdisks............................................................................................... 6-11
Figure 6-7.
Simple Volume Block Distribution.............................................................................. 6-12
Figure 6-8.
Simple Volume 1........................................................................................................ 6-13
Figure 6-9.
Concatenated Volume Block Distribution .................................................................. 6-14
Figure 6-10.
Concatenated Volume 1 .......................................................................................... 6-15
Figure 6-11.
Striped Volume Block Distribution ........................................................................... 6-16
Figure 6-12.
Striped Volume 1 ..................................................................................................... 6-18
Figure 6-13.
Mirrored Volume Block Distribution ......................................................................... 6-19
Figure 6-14.
Mirrored Volume 1 ................................................................................................... 6-20
Figure 6-15.
RAID 10 Volume Block Distribution ......................................................................... 6-22
Figure 6-16.
First Mirrored Volume of RAID 10 ........................................................................... 6-23
Figure 6-17.
Second Mirrored Volume of RAID 10 ...................................................................... 6-24
Figure 6-18.
Striped Volume of RAID 10 ..................................................................................... 6-25
Figure 7-1.
iSCSI Target Access.................................................................................................... 7-3
Figure 7-2.
Identity A’s iSCSI Initiators .......................................................................................... 7-3
Figure 7-3.
Identity B’s iSCSI Initiators .......................................................................................... 7-4
Figure 7-4.
Identity C’s iSCSI Initiator ............................................................................................ 7-4
Figure 7-5.
Identities Coupled with Targets ................................................................................... 7-5
Figure 7-6.
Access Rights per Identity-Target Pair ........................................................................ 7-6
Figure 7-7.
iSCSI Initiator in Two Different Identities ..................................................................... 7-7
Figure 7-8.
Identity with iSCSI Initiators and Credentials............................................................... 7-8
Figure 7-9.
Modifying Default Identities ......................................................................................... 7-9
Figure 7-10.
Creating a Target..................................................................................................... 7-12
Figure 7-11.
Creating an Identity.................................................................................................. 7-17
Figure 7-12.
Adding an Initiator.................................................................................................... 7-19
Figure 7-13.
Adding a Second Initiator ........................................................................................ 7-20
Figure 7-14.
Assigning Credentials .............................................................................................. 7-22
Figure 7-15.
Adding Another Set of Credentials .......................................................................... 7-23
Figure 7-16.
Sending a CHAP Authentication Challenge ............................................................ 7-25
Figure 7-17.
Logging in to a RADIUS Server............................................................................... 7-27
Figure 7-18.
Connecting a Target and Identity ............................................................................ 7-29
Figure 7-19.
Exposing a Volume.................................................................................................. 7-32
Figure 8-1.
Adding Another Child to a Mirror ................................................................................. 8-5
Figure 8-2.
Creating a Mirror to Add Data Redundancy ................................................................ 8-6
Figure 8-3.
Adding Sim6 to Mir4 .................................................................................................... 8-7
Figure 8-4.
1
st
Snapshot Created ................................................................................................... 8-8
Figure 8-5.
1
st
Write to Source and Update to 1
st
Snapshot .......................................................... 8-9
Figure 8-6.
1
st
Snapshot............................................................................................................... 8-11
Figure 8-7.
Update to 1
st
Snapshot & 1
st
Write to Source............................................................ 8-11
Figure 8-8.
2
nd
Snapshot Created, Update to 1
st
Snapshot & 2
nd
Snapshot and Write to Source8-12
Figure 8-9.
3
rd
Snapshot Created, Update to 1
st
& 2
nd
Snapshot and Write to Source................ 8-13
Figure 8-10.
Removing a Child from a Mirror............................................................................... 8-17
Figure 8-11.
Breaking a Mirror ..................................................................................................... 8-18