SANRAD I3.1.1205 User Manual
Page 9
Table of Contents
iii
iscsi discovery rportal set.........................................................................................................................................4-21
iscsi discovery rportal discover ................................................................................................................................4-22
iscsi discovery rportal add........................................................................................................................................4-22
iscsi discovery rportal remove..................................................................................................................................4-23
Configuring IP Routing ................................................................................................... 4-23
Adding an IP Route..................................................................................................................................................4-24
Setting a Default Gateway .......................................................................................................................................4-25
Checking IP Routes .................................................................................................................................................4-26
Viewing IP Routes....................................................................................................................................................4-26
Removing an IP Route.............................................................................................................................................4-26
CHAPTER 5: V-Switch Cluster Configuration..........................................5-1
Introduction to V-Switch Clusters.................................................................................... 5-2
Configuring a V-Switch Cluster........................................................................................ 5-5
Setting the V-Switch ID ..............................................................................................................................................5-5
Adding a Neighbor .....................................................................................................................................................5-5
Working with SCSI Storage Devices..........................................................................................................................5-8
Maintaining Cluster Communications.........................................................................................................................5-8
Enabling and Disabling Failover ................................................................................................................................5-9
Further V-Switch Cluster Configurations....................................................................................................................5-9
Viewing V-Switch Neighbor Details..........................................................................................................................5-10
Managing a Cluster.......................................................................................................... 5-11
CHAPTER 6: Volume Configuration ........................................................6-1
Introduction to Volume Configuration............................................................................. 6-2
Identifying Available Storage Devices............................................................................. 6-3
Creating a Transparent Volume ....................................................................................... 6-6
Creating a Subdisk (LUN Carving) ................................................................................... 6-8
Creating a Simple Volume .............................................................................................. 6-11
Creating a Concatenated Volume .................................................................................. 6-13
Creating a Striped Volume.............................................................................................. 6-16
Creating a Mirrored Volume............................................................................................ 6-18
Replicating Data in a Mirrored Volume ....................................................................................................................6-20
Creating a RAID 10 and RAID 0+1 .................................................................................. 6-21
CHAPTER 7: Volume Exposure & Security..............................................7-1
Introduction to Volume Exposure & Security ................................................................. 7-2
iSCSI Targets.............................................................................................................................................................7-2
Identities.....................................................................................................................................................................7-3
Access Rights ............................................................................................................................................................7-6
Authentication ............................................................................................................................................................7-7
Default Identity ...........................................................................................................................................................7-8