Dell ISCSI manual Creating Access Control Records

Page 36

iSCSI target name that is generated for the volume. Host access to the volume is always through the iSCSI target name, not the volume name.

Description — The volume description is optional.

Storage pool — All volume data is restricted to the members that make up the pool. By default, the volume is assigned to the default pool. If multiple pools exist, you can assign the volume to a different pool.

2.Click Next.

The Create Volume – Space Reserve dialog box is displayed. Specify information in the following fields:

Volume size — This is the reported size of the volume as seen by iSCSI initiators. The minimum volume size is 15 MB. In addition, volume sizes are rounded up to the next multiple of 15.

Thin provisioned volume — Select this check box to enable thin provisioning on the volume. When selected, slider bars appear in the Reported volume size panel. Use them to modify the following default thin provisioning values:

*Minimum volume reserve — This is the minimum amount of space to allocate to the volume. As the volume is used, more space is allocated to the volume, and the volume reserve is increased. The default is 10% of the volume size.

*In-use space warning value — When in-use space reaches this value, as a percentage of the volume size, a warning event message is generated. The warning informs you that volume space is being used, enabling you to make adjustments, as needed. The default is the group-wide volume setting.

*Maximum in-use space value — When the in-use space reaches this value, as a percentage of the volume size, the volume is set offline. The default is the group-wide volume setting.

Snapshot reserve — If you want to create snapshots of the volume, specify the amount of pool space to reserve for snapshots, as a percentage of the volume reserve.

3.Click Next.

The Create Volume – iSCSI Access Policy dialog box is displayed, which enables you to create an access control record for the volume.

Creating Access Control Records

Access control records are used to restrict volume access to hosts that supply a CHAP user name and password that is recognized or that match an IP address or iSCSI initiator name (or any combination of the three).

To create an access control record that applies to the volume and its snapshots:

1.In the Create Volume – iSCSI Access Policy dialog box, click Restricted access and one or more of the following:

Authenticate using CHAP user name — Restricts access to hosts that supply the specified CHAP user name and the associated password. The user name must match a local CHAP account or an account on an external RADIUS server.

Limit access by IP address — Restricts access to hosts with the specified initiator IP address (for example, 12.16.22.123). Use asterisks for “wildcards,” if desired (for example, 12.16.*.*). An asterisk can replace an entire octet, but not a digit within an octet.

Limit access to iSCSI initiator name — Restricts access to hosts with the specified iSCSI initiator.

NOTE: When using IP addresses or iSCSI initiator names to restrict access, ensure to create an access control record for each IP address or iSCSI initiator name presented by an authorized host. Additional records can be added if you do not want to create an access control record at this time, select No access. No host is allowed access to the volume until you create a record.

2.Select the Enable shared access to the iSCSI target from multiple initiators check box.

3.After specifying the access information, click Next to display the Create Volume - Summary dialog box.

4.Click Finish to create the volume.

5.Verify that the volume is enabled for shared access by multiple initiators:

Right click on the volume that has just been created, and select Modify Volume Settings.

36

Image 36
Contents Hardware Installation and Troubleshooting Guide Page Contents Page Cluster Solution ConnectivityCluster Hardware Requirements Cluster NodesCluster Storage Network Switches Dedicated To iSCSI Cluster Storage RequirementsDell EqualLogic PS Series Storage Array Requirements NICs Dedicated To iSCSINetwork Configuration Recommendations Supported Cluster Configurations Other Documents You May NeedISCSI SAN-Attached Cluster Page Power Supplies Cabling Information Mouse, Keyboard, And Monitor Cabling InformationCluster Cabling Information For Public And Private Networks Network Connection Description Public networkPrivate network For Public Network For Private NetworkMethod Hardware Components Storage Arrays Cabling Information NIC TeamingCabling The Storage For Your iSCSI SAN-Attached Cluster Dual-Port Network Adapters UsageTwo-Node iSCSI SAN-Attached Cluster Cabling The Dell EqualLogic PS4110/PS6110 Storage Arrays Sixteen-Node iSCSI SAN-Attached ClusterFor more information, see the figures below Dell EqualLogic PS6110 storage system Cluster node Switch Cabling The Dell EqualLogic PS5000/PS5500 Storage Arrays Dell EqualLogic PS5000 storage system Dell EqualLogic PS6000 storage system Switch Dell EqualLogic PS6500 storage system Obtaining More Information Page Configuring a Cluster Preparing Your Systems For ClusteringInstallation Overview Additional Information For Installing iSCSI NICsHost Integration Tools Installing The Host Integration Tools Running The Remote Setup WizardArray Configuration EqualLogic PS Series Arrays And GroupsGroup Configuration Initializing An Array And Creating a GroupInitializing An Array And Expanding a Group Member Successfully Added to GroupComputer Access To a Group Enabling Computer Access To a GroupConfiguring Multipath I/O Between a Computer And a Group Configuring Group Access dialog box, click Finish Installing The Microsoft iSCSI Software Initiator Configuring Firewall To Allow Icmp Echo RequestsModifying The Registry Settings Configuration Overview Of Shared Storage ArraysCreating Volumes Click Volumes and Create volumeRunning The Group Manager GUI Group Manager GUI ComponentsCreating Access Control Records Advanced Storage Features Connecting Hosts To VolumesSnapshots Creating SnapshotsRestoring Snapshots Volumes Cloning VolumesRestoring Volumes Clone Volume Space Reserve dialog box is displayedReplicating Volumes ReplicationInstallation And Configuration Of a Failover Cluster Volume CollectionsCreating Volume Collections Thin ProvisioningPage Problem Probable Cause Corrective Action Support.microsoft.comCluster Select Advanced → MinimumProblem Probable Cause Select Modify Volume SettingsClick Cluster Services ServiceDo you want to proceed y/nn Cluster Information Additional NetworksPage ISCSI Configuration Worksheet