beautypg.com

Dell PowerVault NX3100 User Manual

Page 10

background image

10

Introduction

It is a good practice to have two ports dedicated for iSCSI. Configure each
NIC (or ports if you have a multiport NIC) on a separate subnet.

Secured iSCSI is possible with Challenge-Handshake Authentication
Protocol (CHAP). For more information about CHAP settings, see
"Configuring Secured iSCSI Connections Using Challenge-Handshake
Authentication Protocol" on page 35.

Table 1-2.

Worksheet

NOTE:

IQNs are the standard naming convention for identifying Targets and

Initiators and it is recommended that you use IQN as the identifier whenever
possible.

NOTE:

It is recommended that you configure dedicated iSCSI NICs on

separate subnets and not on the public network.

Options

Host IP

Target IP

NIC 1

iSCSI

Public

Other

NIC 2

iSCSI

Public

Other

NIC 3

iSCSI

Public

Other

NIC 4

iSCSI

Public

Other