Dell Computer Drive Changing the iSCSI Target Identification, Changing the iSCSI Target Discovery

Page 34

Changing the iSCSI Target Identification

You cannot change the iSCSI target name, but you can associate an alias with the target for simpler identification. Aliases are useful because the iSCSI target names are not intuitive. You should provide an iSCSI target alias that is meaningful and easy to remember.

1Click the iSCSI tab, and then click Change Target Identification.

2Type the alias in the iSCSI target alias field and click OK.

NOTE: Aliases can contain a maximum of 30 characters. Aliases can include letters, numbers, and the special characters underscore (_), minus (-), and pound sign (#). No other special characters are permitted.

NOTE: Open iSCSI (which is used by Red Hat Enterprise Linux 5 and SUSE® Linux Enterprise Server 10 with SP 1) does not support using target alias.

Changing the iSCSI Target Discovery

1Click the iSCSI tab, and then click Change Target Discovery.

2Select the Use iSNS server check box to activate iSCSI target discovery. You can use one of these methods:

a Use the DHCP option (IPv4 only) to automatically activate target discovery. You also can refresh the DHCP.

b Type the IPv4 or IPv6 address to activate the target discovery. After you manually enter an IP address, you also can click Advanced to set the customized TCP listening ports.

3If you do not want to allow discovery sessions that are not named, select

Disallow un-named discovery sessions.

Un-named discovery sessions are discovery sessions that are permitted to run without a target name. With an un-named discovery session, the target name or the target portal group tag is not available to enforce the iSCSI session identifier (ISID) rule. For more information on un-named discovery sessions, click the Support tab, then click View Online Help.

34

Using iSCSI

Image 34
Contents Dell PowerVault Modular Disk Storage Manager User’s Guide W . d e l l . c o m s u p p o r t . d e l l . c o mFebruary Contents Connecting the Serial Cable System Setup for Password Reset Viewing iSCSI Statistics and Setting Baseline Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Troubleshooting Problems 101 Contents About This Guide User InterfaceSummary Tab Configure TabModify Tab ISCSI Tab Tools TabSupport Tab Other Information You May Need View online help View the event logAccess Virtual Disk About Your Storage ArrayOut-of-Band and In-Band Management Automatic Discovery of Storage Arrays Adding Storage ArraysManual Addition of a Storage Array Naming Storage Arrays Removing Storage ArraysSetting Up Your Storage Array Initial setup tasks includeStorage Array To set, change, or remove a password for a storage array Setting a PasswordStorage Array Support Data Connecting the Serial Cable Resetting a PasswordPassword Guidelines Consider these guidelines when you create a passwordSystem Setup for Password Reset Microsoft Windows Operating SystemsReset Password Configuring E-mail Alerts Configuring Alert NotificationsChanging Expansion Enclosure ID Numbers Storage Array Configuring Snmp Alerts Starting or Restarting the Host-Agent Software in Windows Starting or Restarting the Host-Agent Software in LinuxStorage Array Storage Array Using iSCSI Using the iSCSI TabEntering Mutual Authentication Permissions Changing the iSCSI Target AuthenticationCreating Chap Secrets Valid Ascii Characters for Chap Secrets Space Using iSCSI Changing the iSCSI Target Discovery Changing the iSCSI Target IdentificationType the alias in the iSCSI target alias field and click OK Configuring the MD3000i iSCSI Host Ports Advanced iSCSI Host Ports SettingsLowest priority default Viewing or Ending an iSCSI SessionViewing iSCSI Statistics and Setting Baseline Statistics Edit, Remove, or Rename Host Topology Host Topology Actions Desired Action Using iSCSI Event Monitor Service Status area, click Start LinuxEnabling the Event Monitor Disabling the Event Monitor Configuring Host Access About Your HostAutomatic Configuration Manual Configuration using SAS HBAManual Configuration using iSCSI Click NextRemoving Host Access Creating a Host Group Host GroupsAdding a Host to a Host Group Removing a Host From a Host Group Moving a Host to a Different Host GroupHost Topology Removing a Host GroupHost Context Agent Data Path Protection Create a virtual disk and map it to LUN Reboot the hostFailover with Red Hat Enterprise Linux About Your Host Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Manual Configuration Disk Groups and Virtual Disks Disk Groups and Virtual Disks Automatically Configuring Hot Spares Hot Spare Drive ProtectionManually Configuring Hot Spares Click OK in the dialog boxCreating Host-to-Virtual Disk Mappings Host-to-Virtual Disk MappingModifying and Removing Host-to-Virtual Disk Mapping Storage Partitioning Changing Controller Ownership of the Virtual DiskDisk Group Expansion Disk Group and Virtual Disk ExpansionVirtual Disk Expansion Errors discovered by the media scan include Changing Media Scan SettingsStorage Array Media Scan Virtual Disk Service Microsoft ServicesSuspending the Media Scan Volume Shadow-Copy Service Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Simple Path About the Simple PathHost-to-Virtual Disk Mapping The default setting is Map now SMrepassist -ffilename-identifier Creating the Snapshot Using the Simple Path Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced PathSnapshot Virtual Disks SMrepassist -ffilename-identifier Creating the Snapshot Using the Advanced Path Snapshot Virtual Disks Specifying Snapshot Virtual Disk Names Source-virtual disk-name-sequence-numberSnapshot Repository Capacity Re-creating Snapshot Virtual Disks Disabling a Snapshot Virtual DiskTo disable a snapshot virtual disk Preparing Host Servers to Re-create a Snapshot Virtual DiskRe-creating a Snapshot Virtual Disk Premium Feature-Virtual Disk Copy Creating a Virtual Disk Copy for an Mscs Shared Disk Reasons to use virtual disk copy include the followingIf you are using the target virtual disk for backup purposes Virtual Disk Read/Write PermissionsVirtual Disk Copy Restrictions Creating a Virtual Disk Copy Preparing Host Servers to Create a Virtual Disk CopyChoose the target virtual disk Copying the Virtual DiskClick Next at the bottom Setting Copy Priority Storage Array Performance During Virtual Disk CopyTo stop a virtual disk copy, complete the following steps Stopping a Virtual Disk CopyRecopying a Virtual Disk Click Yes to stop the virtual disk copyPreparing Host Servers to Recopy a Virtual Disk Recopying the Virtual Disk Removing Copy Pairs Virtual Disk Copy Firmware Downloads Downloading RAID Controller and Nvsram PackagesDownloading Both RAID Controller and Nvsram Firmware Downloading Only Nvsram Firmware Downloading Non-redundant Mscs Nvsram FirmwareDownloading Physical Disk Firmware Downloading EMM Firmware 100 Storage Array Profile Troubleshooting ProblemsRecovery Guru Device Health ConditionsSMrepassist Utility 102Click Browse Support Information Package103 Recovering from an Unidentified Storage Array Unidentified DevicesPing host-name-or-IP-address-of-the-host 105Troubleshooting Inserting an EMM into an Expansion Enclosure Removing an EMM from the Expansion Enclosure107 Removing and Inserting Physical Disks MD3000 Maintenance Considerations108 109 110 Index 111Index 113 114

Computer Drive specifications

Dell Computer drives are a crucial component of the brand's range of products, delivering reliable storage solutions tailored for various user needs. Dell offers a diverse lineup of drives, including solid-state drives (SSDs), hard disk drives (HDDs), and hybrid drives, each featuring distinct characteristics that cater to different performance requirements.

One standout feature of Dell's SSDs is their use of advanced NAND flash technology. This results in significantly faster read and write speeds compared to traditional HDDs, ensuring quicker boot times and application loading. With capacities ranging from 128GB to 8TB, Dell SSDs are ideal for both casual users and professionals who require consistent performance for data-intensive applications such as video editing, gaming, and large database management.

Dell's HDDs, on the other hand, remain a popular choice for users who prioritize storage capacity over speed. With options available in sizes from 500GB to 10TB, these drives offer users ample space to store large files, such as videos, music libraries, and software applications. Dell's enterprise-grade HDDs are known for their durability and reliability, making them suitable for server environments where data integrity is paramount.

Incorporating hybrid drives, Dell brings the best of both worlds. By combining the speed of SSDs with the capacity of HDDs, hybrid drives offer a balanced solution for users seeking improved performance without sacrificing storage space. These drives utilize a small amount of SSD storage as a cache to speed up frequently accessed files, enhancing overall system responsiveness.

Dell also emphasizes data protection in its drive offerings, with features like encryption and secure erase capabilities. This focus on security is vital for users in business environments, where sensitive information must be safeguarded against unauthorized access.

Another characteristic that sets Dell drives apart is their compatibility with a wide range of systems. Dell ensures that its drives can seamlessly integrate with various models, from laptops to desktops and servers. Furthermore, Dell's support for RAID (Redundant Array of Independent Disks) configurations allows users to configure their storage systems for enhanced performance, redundancy, or both.

In conclusion, Dell Computer drives encompass a comprehensive range of features and technologies that meet the needs of diverse users. With their emphasis on speed, capacity, durability, and security, Dell drives are a trusted choice for anyone seeking reliable storage solutions. Whether in personal computing or enterprise environments, Dell stands at the forefront of storage technology, continually evolving to meet user demands.