beautypg.com

SANRAD I3.1.1205 User Manual

Page 9

background image

Table of Contents

iii

iscsi discovery rportal set.........................................................................................................................................4-21

iscsi discovery rportal discover ................................................................................................................................4-22

iscsi discovery rportal add........................................................................................................................................4-22

iscsi discovery rportal remove..................................................................................................................................4-23

Configuring IP Routing ................................................................................................... 4-23

Adding an IP Route..................................................................................................................................................4-24

Setting a Default Gateway .......................................................................................................................................4-25

Checking IP Routes .................................................................................................................................................4-26

Viewing IP Routes....................................................................................................................................................4-26

Removing an IP Route.............................................................................................................................................4-26

CHAPTER 5: V-Switch Cluster Configuration..........................................5-1

Introduction to V-Switch Clusters.................................................................................... 5-2

Configuring a V-Switch Cluster........................................................................................ 5-5

Setting the V-Switch ID ..............................................................................................................................................5-5

Adding a Neighbor .....................................................................................................................................................5-5

Working with SCSI Storage Devices..........................................................................................................................5-8

Maintaining Cluster Communications.........................................................................................................................5-8

Enabling and Disabling Failover ................................................................................................................................5-9

Further V-Switch Cluster Configurations....................................................................................................................5-9

Viewing V-Switch Neighbor Details..........................................................................................................................5-10

Managing a Cluster.......................................................................................................... 5-11

CHAPTER 6: Volume Configuration ........................................................6-1

Introduction to Volume Configuration............................................................................. 6-2

Identifying Available Storage Devices............................................................................. 6-3

Creating a Transparent Volume ....................................................................................... 6-6

Creating a Subdisk (LUN Carving) ................................................................................... 6-8

Creating a Simple Volume .............................................................................................. 6-11

Creating a Concatenated Volume .................................................................................. 6-13

Creating a Striped Volume.............................................................................................. 6-16

Creating a Mirrored Volume............................................................................................ 6-18

Replicating Data in a Mirrored Volume ....................................................................................................................6-20

Creating a RAID 10 and RAID 0+1 .................................................................................. 6-21

CHAPTER 7: Volume Exposure & Security..............................................7-1

Introduction to Volume Exposure & Security ................................................................. 7-2

iSCSI Targets.............................................................................................................................................................7-2

Identities.....................................................................................................................................................................7-3

Access Rights ............................................................................................................................................................7-6

Authentication ............................................................................................................................................................7-7

Default Identity ...........................................................................................................................................................7-8