beautypg.com

Dell PowerVault MD3000i User Manual

Page 20

background image

20

Storage Array

6 Configure Host Access — Set up one or more hosts to access the storage

array. See "Configuring Host Access" on page 43 for more information.

7 Configure storage array (2 options)

a

Automatic (Simple) configuration

Step 1: Automatic Configuration — See "Creating Disk Groups
and Virtual Disks" on page 54 for mor
e information.

Step 2: Create Host-to-Virtual Disk Mappings — See "Creating
Host-to-Virtual Disk Mappings" on page 60 for mor
e information.

b

Manual (Advanced) configuration

Step 1: Create Virtual Disks — See "Manual Configuration" on
page 55 for mor
e information.

Step 2: Configure Hot Spare Physical Disks — See "Manually
Configuring Hot Spares" on page 59 for mor
e information.

8 Manage iSCSI Settings — This option will be present only if your

controllers contain iSCSI host ports.

a

Change Target Authentication — Choose the authentication methods
and permissions (if required) for an initiator to access the target.

b

Enter Mutual Authentication Permissions — If initiators require
mutual authentication, you can enter permissions for the target to
access the initiator.

c

Change Target Identification — Define an alias for the target for easy
identification.

d

Change Target Discovery — Configure parameters for how the target
will be discovered on the network.

9 View and Enable Premium Features (Optional) — You may have

purchased premium features, including snapshot virtual disks and virtual
disk copies. See which premium features are currently available to you and
enable these features if they are currently turned off.

10 Configure Ethernet Management Ports (Optional) — Configure network

parameters for the Ethernet management ports managing a storage array
for out-of-band Ethernet connections.