Dell Computer Drive manual Storage Array

Page 20

6Configure Host Access — Set up one or more hosts to access the storage array. See "Configuring Host Access" on page 43 for more information.

7Configure storage array (2 options)

a Automatic (Simple) configuration

Step 1: Automatic Configuration — See "Creating Disk Groups and Virtual Disks" on page 54 for more information.

Step 2: Create Host-to-Virtual Disk Mappings — See "Creating Host-to-Virtual Disk Mappings" on page 60 for more information.

bManual (Advanced) configuration

Step 1: Create Virtual Disks — See "Manual Configuration" on page 55 for more information.

Step 2: Configure Hot Spare Physical Disks — See "Manually Configuring Hot Spares" on page 59 for more information.

8Manage iSCSI Settings — This option will be present only if your controllers contain iSCSI host ports.

a Change Target Authentication — Choose the authentication methods and permissions (if required) for an initiator to access the target.

b Enter Mutual Authentication Permissions — If initiators require mutual authentication, you can enter permissions for the target to access the initiator.

c Change Target Identification — Define an alias for the target for easy identification.

d Change Target Discovery — Configure parameters for how the target will be discovered on the network.

9View and Enable Premium Features (Optional) — You may have purchased premium features, including snapshot virtual disks and virtual disk copies. See which premium features are currently available to you and enable these features if they are currently turned off.

10Configure Ethernet Management Ports (Optional) — Configure network parameters for the Ethernet management ports managing a storage array for out-of-band Ethernet connections.

20

Storage Array

Image 20
Contents Dell PowerVault Modular Disk Storage Manager User’s Guide W . d e l l . c o m s u p p o r t . d e l l . c o mFebruary Contents Connecting the Serial Cable System Setup for Password Reset Viewing iSCSI Statistics and Setting Baseline Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Troubleshooting Problems 101 Contents About This Guide User InterfaceModify Tab Configure TabSummary Tab Support Tab Tools TabISCSI Tab Other Information You May Need View online help View the event logAccess Virtual Disk About Your Storage ArrayOut-of-Band and In-Band Management Manual Addition of a Storage Array Adding Storage Arrays Automatic Discovery of Storage Arrays Naming Storage Arrays Removing Storage ArraysSetting Up Your Storage Array Initial setup tasks includeStorage Array Storage Array Support Data Setting a PasswordTo set, change, or remove a password for a storage array Resetting a Password Password GuidelinesConnecting the Serial Cable Consider these guidelines when you create a passwordSystem Setup for Password Reset Microsoft Windows Operating SystemsReset Password Changing Expansion Enclosure ID Numbers Configuring Alert NotificationsConfiguring E-mail Alerts Storage Array Configuring Snmp Alerts Starting or Restarting the Host-Agent Software in Windows Starting or Restarting the Host-Agent Software in LinuxStorage Array Storage Array Using iSCSI Using the iSCSI TabCreating Chap Secrets Changing the iSCSI Target AuthenticationEntering Mutual Authentication Permissions Valid Ascii Characters for Chap Secrets Space Using iSCSI Type the alias in the iSCSI target alias field and click OK Changing the iSCSI Target IdentificationChanging the iSCSI Target Discovery Configuring the MD3000i iSCSI Host Ports Advanced iSCSI Host Ports SettingsLowest priority default Viewing or Ending an iSCSI SessionViewing iSCSI Statistics and Setting Baseline Statistics Edit, Remove, or Rename Host Topology Host Topology Actions Desired Action Using iSCSI Enabling the Event Monitor Service Status area, click Start LinuxEvent Monitor Disabling the Event Monitor Configuring Host Access About Your HostAutomatic Configuration Manual Configuration using SAS HBAManual Configuration using iSCSI Click NextRemoving Host Access Adding a Host to a Host Group Host GroupsCreating a Host Group Removing a Host From a Host Group Moving a Host to a Different Host GroupHost Topology Removing a Host GroupHost Context Agent Failover with Red Hat Enterprise Linux Create a virtual disk and map it to LUN Reboot the hostData Path Protection About Your Host Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Manual Configuration Disk Groups and Virtual Disks Disk Groups and Virtual Disks Automatically Configuring Hot Spares Hot Spare Drive ProtectionManually Configuring Hot Spares Click OK in the dialog boxModifying and Removing Host-to-Virtual Disk Mapping Host-to-Virtual Disk MappingCreating Host-to-Virtual Disk Mappings Storage Partitioning Changing Controller Ownership of the Virtual DiskVirtual Disk Expansion Disk Group and Virtual Disk ExpansionDisk Group Expansion Storage Array Media Scan Changing Media Scan SettingsErrors discovered by the media scan include Suspending the Media Scan Microsoft ServicesVirtual Disk Service Volume Shadow-Copy Service Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Simple Path About the Simple PathHost-to-Virtual Disk Mapping The default setting is Map now SMrepassist -ffilename-identifier Creating the Snapshot Using the Simple Path Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced PathSnapshot Virtual Disks SMrepassist -ffilename-identifier Creating the Snapshot Using the Advanced Path Snapshot Virtual Disks Specifying Snapshot Virtual Disk Names Source-virtual disk-name-sequence-numberSnapshot Repository Capacity Re-creating Snapshot Virtual Disks Disabling a Snapshot Virtual DiskTo disable a snapshot virtual disk Preparing Host Servers to Re-create a Snapshot Virtual DiskRe-creating a Snapshot Virtual Disk Premium Feature-Virtual Disk Copy Creating a Virtual Disk Copy for an Mscs Shared Disk Reasons to use virtual disk copy include the followingIf you are using the target virtual disk for backup purposes Virtual Disk Read/Write PermissionsVirtual Disk Copy Restrictions Creating a Virtual Disk Copy Preparing Host Servers to Create a Virtual Disk CopyClick Next at the bottom Copying the Virtual DiskChoose the target virtual disk Setting Copy Priority Storage Array Performance During Virtual Disk CopyStopping a Virtual Disk Copy Recopying a Virtual DiskTo stop a virtual disk copy, complete the following steps Click Yes to stop the virtual disk copyPreparing Host Servers to Recopy a Virtual Disk Recopying the Virtual Disk Removing Copy Pairs Virtual Disk Copy Firmware Downloads Downloading RAID Controller and Nvsram PackagesDownloading Both RAID Controller and Nvsram Firmware Downloading Only Nvsram Firmware Downloading Non-redundant Mscs Nvsram FirmwareDownloading Physical Disk Firmware Downloading EMM Firmware 100 Troubleshooting Problems Recovery GuruStorage Array Profile Device Health ConditionsSMrepassist Utility 102103 Support Information PackageClick Browse Recovering from an Unidentified Storage Array Unidentified DevicesPing host-name-or-IP-address-of-the-host 105Troubleshooting 107 Removing an EMM from the Expansion EnclosureInserting an EMM into an Expansion Enclosure 108 MD3000 Maintenance ConsiderationsRemoving and Inserting Physical Disks 109 110 Index 111Index 113 114