Dell Computer Drive manual Changing the iSCSI Target Authentication, Creating Chap Secrets

Page 32

Changing the iSCSI Target Authentication

If an initiator requires mutual (bi-directional) authentication see "Entering Mutual Authentication Permissions" on page 32.

1Click the iSCSI tab, and then click Change Target Authentication.

2Select None if no authentication is required for any initiator to access the target.

NOTE: If you select None, any initiator can access this target. Use this option only if you do not require secure data. However, if you select both None and CHAP at the same time, the storage array will allow an iSCSI initiator to log on with or without CHAP authentication.

3Select CHAP if you want any initiator that tries to access the target to provide the target permissions. If CHAP is selected, but no CHAP secret is defined, an error message appears.

Click CHAP Secret to see the Enter CHAP Secret dialog (see "Creating CHAP Secrets" on page 32). You can define the permissions in this dialog.

Entering Mutual Authentication Permissions

Mutual authentication or two-way authentication is a way for a client or a user to verify themselves to a host server, and for the host server to validate itself to the user. This validation is accomplished in such a way that both parties are sure of the other’s identity.

1Click the iSCSI tab, and then click Enter Mutual Authentication Permissions.

2Select an initiator from the list. The initiator details are shown.

3Select CHAP Secret to enter the initiator CHAP permissions in the dialog that appears.

NOTE: To add, modify, or delete an initiator, click the Modify tab, and then click Edit Host Topology.

Creating CHAP Secrets

When you set up an authentication method, you can choose to create a Challenge Handshake Authentication Protocol (CHAP) secret. The CHAP secret is a password that is recognized by the initiator and the target. If you are using mutual authentication to configure the MD3000i storage array, you

32

Using iSCSI

Image 32
Contents Dell PowerVault Modular Disk Storage Manager User’s Guide W . d e l l . c o m s u p p o r t . d e l l . c o mFebruary Contents Connecting the Serial Cable System Setup for Password Reset Viewing iSCSI Statistics and Setting Baseline Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Troubleshooting Problems 101 Contents About This Guide User InterfaceModify Tab Configure TabSummary Tab Support Tab Tools TabISCSI Tab Other Information You May Need View online help View the event logAccess Virtual Disk About Your Storage ArrayOut-of-Band and In-Band Management Manual Addition of a Storage Array Adding Storage ArraysAutomatic Discovery of Storage Arrays Naming Storage Arrays Removing Storage ArraysSetting Up Your Storage Array Initial setup tasks includeStorage Array Storage Array Support Data Setting a PasswordTo set, change, or remove a password for a storage array Resetting a Password Password GuidelinesConnecting the Serial Cable Consider these guidelines when you create a passwordSystem Setup for Password Reset Microsoft Windows Operating SystemsReset Password Changing Expansion Enclosure ID Numbers Configuring Alert NotificationsConfiguring E-mail Alerts Storage Array Configuring Snmp Alerts Starting or Restarting the Host-Agent Software in Windows Starting or Restarting the Host-Agent Software in LinuxStorage Array Storage Array Using iSCSI Using the iSCSI TabCreating Chap Secrets Changing the iSCSI Target AuthenticationEntering Mutual Authentication Permissions Valid Ascii Characters for Chap Secrets Space Using iSCSI Type the alias in the iSCSI target alias field and click OK Changing the iSCSI Target IdentificationChanging the iSCSI Target Discovery Configuring the MD3000i iSCSI Host Ports Advanced iSCSI Host Ports SettingsLowest priority default Viewing or Ending an iSCSI SessionViewing iSCSI Statistics and Setting Baseline Statistics Edit, Remove, or Rename Host Topology Host Topology Actions Desired Action Using iSCSI Enabling the Event Monitor Service Status area, click Start LinuxEvent Monitor Disabling the Event Monitor Configuring Host Access About Your HostAutomatic Configuration Manual Configuration using SAS HBAManual Configuration using iSCSI Click NextRemoving Host Access Adding a Host to a Host Group Host GroupsCreating a Host Group Removing a Host From a Host Group Moving a Host to a Different Host GroupHost Topology Removing a Host GroupHost Context Agent Failover with Red Hat Enterprise Linux Create a virtual disk and map it to LUN Reboot the hostData Path Protection About Your Host Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Manual Configuration Disk Groups and Virtual Disks Disk Groups and Virtual Disks Automatically Configuring Hot Spares Hot Spare Drive ProtectionManually Configuring Hot Spares Click OK in the dialog boxModifying and Removing Host-to-Virtual Disk Mapping Host-to-Virtual Disk MappingCreating Host-to-Virtual Disk Mappings Storage Partitioning Changing Controller Ownership of the Virtual DiskVirtual Disk Expansion Disk Group and Virtual Disk ExpansionDisk Group Expansion Storage Array Media Scan Changing Media Scan SettingsErrors discovered by the media scan include Suspending the Media Scan Microsoft ServicesVirtual Disk Service Volume Shadow-Copy Service Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Simple Path About the Simple PathHost-to-Virtual Disk Mapping The default setting is Map now SMrepassist -ffilename-identifier Creating the Snapshot Using the Simple Path Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced PathSnapshot Virtual Disks SMrepassist -ffilename-identifier Creating the Snapshot Using the Advanced Path Snapshot Virtual Disks Specifying Snapshot Virtual Disk Names Source-virtual disk-name-sequence-numberSnapshot Repository Capacity Re-creating Snapshot Virtual Disks Disabling a Snapshot Virtual DiskTo disable a snapshot virtual disk Preparing Host Servers to Re-create a Snapshot Virtual DiskRe-creating a Snapshot Virtual Disk Premium Feature-Virtual Disk Copy Creating a Virtual Disk Copy for an Mscs Shared Disk Reasons to use virtual disk copy include the followingIf you are using the target virtual disk for backup purposes Virtual Disk Read/Write PermissionsVirtual Disk Copy Restrictions Creating a Virtual Disk Copy Preparing Host Servers to Create a Virtual Disk CopyClick Next at the bottom Copying the Virtual DiskChoose the target virtual disk Setting Copy Priority Storage Array Performance During Virtual Disk CopyStopping a Virtual Disk Copy Recopying a Virtual DiskTo stop a virtual disk copy, complete the following steps Click Yes to stop the virtual disk copyPreparing Host Servers to Recopy a Virtual Disk Recopying the Virtual Disk Removing Copy Pairs Virtual Disk Copy Firmware Downloads Downloading RAID Controller and Nvsram PackagesDownloading Both RAID Controller and Nvsram Firmware Downloading Only Nvsram Firmware Downloading Non-redundant Mscs Nvsram FirmwareDownloading Physical Disk Firmware Downloading EMM Firmware 100 Troubleshooting Problems Recovery GuruStorage Array Profile Device Health ConditionsSMrepassist Utility 102103 Support Information PackageClick Browse Recovering from an Unidentified Storage Array Unidentified DevicesPing host-name-or-IP-address-of-the-host 105Troubleshooting 107 Removing an EMM from the Expansion EnclosureInserting an EMM into an Expansion Enclosure 108 MD3000 Maintenance ConsiderationsRemoving and Inserting Physical Disks 109 110 Index 111Index 113 114

Computer Drive specifications

Dell Computer drives are a crucial component of the brand's range of products, delivering reliable storage solutions tailored for various user needs. Dell offers a diverse lineup of drives, including solid-state drives (SSDs), hard disk drives (HDDs), and hybrid drives, each featuring distinct characteristics that cater to different performance requirements.

One standout feature of Dell's SSDs is their use of advanced NAND flash technology. This results in significantly faster read and write speeds compared to traditional HDDs, ensuring quicker boot times and application loading. With capacities ranging from 128GB to 8TB, Dell SSDs are ideal for both casual users and professionals who require consistent performance for data-intensive applications such as video editing, gaming, and large database management.

Dell's HDDs, on the other hand, remain a popular choice for users who prioritize storage capacity over speed. With options available in sizes from 500GB to 10TB, these drives offer users ample space to store large files, such as videos, music libraries, and software applications. Dell's enterprise-grade HDDs are known for their durability and reliability, making them suitable for server environments where data integrity is paramount.

Incorporating hybrid drives, Dell brings the best of both worlds. By combining the speed of SSDs with the capacity of HDDs, hybrid drives offer a balanced solution for users seeking improved performance without sacrificing storage space. These drives utilize a small amount of SSD storage as a cache to speed up frequently accessed files, enhancing overall system responsiveness.

Dell also emphasizes data protection in its drive offerings, with features like encryption and secure erase capabilities. This focus on security is vital for users in business environments, where sensitive information must be safeguarded against unauthorized access.

Another characteristic that sets Dell drives apart is their compatibility with a wide range of systems. Dell ensures that its drives can seamlessly integrate with various models, from laptops to desktops and servers. Furthermore, Dell's support for RAID (Redundant Array of Independent Disks) configurations allows users to configure their storage systems for enhanced performance, redundancy, or both.

In conclusion, Dell Computer drives encompass a comprehensive range of features and technologies that meet the needs of diverse users. With their emphasis on speed, capacity, durability, and security, Dell drives are a trusted choice for anyone seeking reliable storage solutions. Whether in personal computing or enterprise environments, Dell stands at the forefront of storage technology, continually evolving to meet user demands.