Dell PowerVault NX1950 User Manual
Page 29

Detailed End-to-End iSCSI Setup
29
3 The Microsoft iSCSI Initiator Installation screen appears. The options
Initiator Service and Software Initiator are selected by default. The
Microsoft MPIO multi-pathing is unchecked. You must check this
options as the installation requires the use of Multipath I/O (MPIO) feature.
Click
Next.
NOTE:
You must select the Microsoft MPIO support for iSCSI during
installation to accomplish load balancing and failover among multiple NICs
and iSCSI host bus adapters (HBAs). MPIO support in a PowerVault NX 1950
cluster system is available only if you install Microsoft iSCSI initiator
version 2.06 or later.
4 The License Agreement screen appears. Read the agreement and select
I Agree to continue with the installation. Click Next.
5 The Completing the Microsoft iSCSI Initiator Installation Wizard
appears indicating the installation is complete. Click
Finish.
6 The Wizard prompts you to reboot the system. Click OK.
The system reboots and iSCSI Initiator is installed. A command-line
utility called
iSCSICLI is also installed. You can use the iSCSICLI utility
to manage the iSCSI Initiator service and HBAs.
The Release Notes and User Guide are saved to the local host when the iSCSI
Initiator package is extracted. You can find the following information in the
documents that are saved to the hard drive. Some of the restrictions in the list
below may change in future releases.
• Dynamic disks on an iSCSI session are not supported.
• The default iSCSI node name is generated from the Windows computer
name. If the Windows computer name contains a character that is invalid
within an iSCSI node name, such as
_ (underscore), then the Microsoft
iSCSI Initiator service replaces the invalid character with - (hyphen).
• Both Initiator and Target CHAP secrets should be greater than or equal to
12 bytes, and less than or equal to 16 bytes if IPsec is not being used. The
Initiator and Target CHAP secrets should be greater than 1 byte and less
than or equal to 16 bytes if IPsec is being used. For more information
about CHAP, see "CHAP vs IPSec" on page 52.