beautypg.com

Dell PowerVault NX1950 User Manual

Page 35

background image

Detailed End-to-End iSCSI Setup

35

c

The Review Settings and Create Storage screen appears. Review the

storage settings and click

Create.

The Storage provisioning occurs and the

Confirmation screen appears

indicating a successful provisioning operation.

The LUN is now created and ready for use. The step 5 creates iSCSI

Targets and associates the iSCSI Targets with the newly-created LUN.

The PowerVault NX1950 storage solution uses Windows Unified Data

Storage Server 2003 with Microsoft Virtual Disk Service (VDS) internally.

You can also view the LUN in the

PowerVault NX1950 Management

ConsoleStorage Manager for SANs section.

5 Configuring NICs for iSCSI traffic in the PowerVault NX1950 storage

solution in standalone mode— To create iSCSI Targets you must configure

dedicated iSCSI NICs for iSCSI traffic and then create iSCSI Targets.

NOTE:

Create iSCSI Targets only after configuring the Discovery tab in the

iSCSI Initiator

To configure dedicated iSCSI NICs:

a

Go to PowerVault NX1950 Management Console iSCSI Target

section.

b

Right-click the iSCSI Software Target and select Properties.

c

In the Microsoft iSCSI Software Target Properties window, go to the

Network tab. All the NICs on the PowerVault NX1950 storage solution

are listed.

d

Click Edit and uncheck public and private network IP address from

the list. Unchecking public and private network IP addresses from the

list ensures that only the dedicated iSCSI NICs are configured for

iSCSI traffic.

e

If you have an iSNS server configured in your network, go to iSNS tab

and add the iSNS server IP address. Click

OK.

The following steps describe the procedure to create two iSCSI Targets as

shown in the example, Figure 3-4. Each Target is made available to a

different application on the host server. The Target in the Microsoft-based

iSCSI Target solutions only defines the path that the iSCSI storage traffic

uses from the iSCSI Initiator. The storage used by the Target is defined in

a later step when the Virtual Disks are created.