Dell PowerVault TL2000 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Hardware de computador Dell PowerVault TL2000. Dell PowerVault TL2000 User Manual [en] Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 16
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
Page 1
Dell™ Model TL2000/TL4000 1GB
iSCSI to SAS bridge iSCSI initiators
Table of Contents
Install the iSCSI Initiator Software (iSCSI-attached Host Servers Only).......................................3
Installing the iSCSI Initiator on a Windows Host Server............................................................3
Installing the iSCSI Initiator on a Linux Host Server..................................................................3
Installing the iSCSI initiator during RHEL 4 installation .........................................................3
Installing the iSCSI initiator after RHEL 4 installation: ...........................................................3
Installing the iSCSI Initiator on a RHEL 5 System.....................................................................4
Installing the iSCSI initiator during RHEL 5 installation: ........................................................4
Installing the iSCSI initiator after RHEL 5 installation: ...........................................................4
Installing the iSCSI initiator after RHEL 5 installation via the command line: ........................4
Installing the iSCSI Initiator on a SLES 9 System .....................................................................4
Installing the iSCSI initiator during SLES 9 installation:.........................................................4
Installing the iSCSI initiator after SLES 9 installation:............................................................4
Installing the iSCSI Initiator on a SLES 10 SP1 System ...........................................................5
Install the iSCSI initiator during SLES 10 SP1 installation:....................................................5
Installing the iSCSI initiator after SLES 10 SP1 installation:..................................................5
Perform Target Discovery from the iSCSI Initiator........................................................................5
Using Windows Server 2003 or Windows Server 2008 GUI version.........................................5
Using Windows Server 2008 Core Version ...............................................................................6
Using Linux Server....................................................................................................................6
Using RHEL 5 or SLES 10 SP1 ................................................................................................6
Configure CHAP Authentication on the Host Server (optional).....................................................7
Using Windows Server 2003 or Windows Server 2008 GUI version.........................................7
Using Windows Server 2008 Core Version ...............................................................................7
Using Linux Server....................................................................................................................8
If you are using RHEL 5 or SLES 10 SP1 .................................................................................8
If you are using SLES10 SP1 via the GUI.................................................................................8
Vista de página 0
1 2 3 4 5 6 ... 15 16

Resumo do Conteúdo

Página 1 - Table of Contents

Page 1 Dell™ Model TL2000/TL4000 1GB iSCSI to SAS bridge iSCSI initiators Table of Contents Install the iSCSI Initiator Software (iSCSI-attached H

Página 2

Page 10 ListTargets command to display the target list. <Report_To_PNP> is T, which exposes the LUN to the operating system as a storage devi

Página 3

Page 11 ******************************************************************************* Guidelines for Configuring Your Network for iSCSI This sect

Página 4

Page 12 6) To enable use of the Lmhosts file to resolve remote NetBIOS names, select Enable LMHOSTS lookup. 7) To specify the location of the fil

Página 5 - IPSec is not supported

Page 13 1) From the command line, type in ‘iscsi-ls’ This will list all the iSCSI devices that have sessions opened. Look for the duplicate Drive

Página 6 - Using RHEL 5 or SLES 10 SP1

Page 14 • Review optimal network setup and configuration settings; see Guidelines for Configuring Your Network for iSCSI. Performing Hardware Mai

Página 7

Page 15 Reference information Terminology CHAP (Challenge Handshake Authentication Protocol). An optional security protocol used to control acces

Página 8

Page 16 ____________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction i

Página 9

Page 2 Connect to the TL2000/TL4000 from the Host Server ...9 If you are using Windo

Página 10

Page 3 Install the iSCSI Initiator Software (iSCSI-attached Host Servers Only) Your Dell™ Model TL24iSCSIxSAS 1Gb iSCSI to SAS™ bridge requires

Página 11 - Windows Host Setup

Page 4 NOTE: Depending upon your installation method, the system will ask for the required source to install the package. Installing the iSCSI In

Página 12 - Linux Host Setup

Page 5 4) When the linux-iscsi module is displayed, select it. 5) Click on Check Dependencies to determine if any dependencies exist. 6) f no de

Página 13

Page 6 Using Windows Server 2008 Core Version 1) Set the iSCSI initiator service to start automatically: \\<server_name> config msiscsi star

Página 14

Page 7 Configure CHAP Authentication on the Host Server (optional) Select the set of steps in one of the following sections (Windows or Linux) that

Página 15 - Reference information

Page 8 Using Linux Server 1) Edit the /etc/iscsi.conf file to add the entries below for each iSCSI target: For example, your edited /etc/iscsi.con

Página 16 - ____________________

Page 9 2) Click Service Start; then select When Booting. 3) Select Discovered Targets; then select Discovery. 4) Enter the IP address of the por

Comentários a estes Manuais

Sem comentários