Dell Computer Drive manual Automatic Configuration, Manual Configuration using SAS HBA

Page 44

To begin configuring host access, click the Configure tab and then click either Configure Host Access (Automatic) or Configure Host Access (Manual). See the appropriate section for manual configuration, depending on whether you are using SAS HBA or iSCSI.

Automatic Configuration

To automatically configure a host for access to the storage array:

1Click the Configure tab and then click Configure Host Access (Automatic).

2To see hosts that already have access to the storage array, click View configured hosts.

3Select the hosts you want to give access to the storage array in the

Available hosts window.

4To see the ports and the host type for the selected hosts, click View Details at the right of the list.

5Click Add to move specific hosts to the Selected hosts window.

6Click OK to configure access for the hosts you selected.

Manual Configuration (using SAS HBA)

NOTE: Host access that is manually configured requires special attention to ensure that the correct SAS host port World Wide IDs are selected for each host. If any incorrect IDs are configured, an inaccurate topology will result. You can use the SAS/5/E HBA BIOS Setup program to identify the World Wide IDs for the SAS host ports.

Configure the host to make it available to the storage array for volume mapping by following these steps.

1Click the Configure tab and then click Configure Host Access (Manual).

2Type a name of your choice in the Enter host name text box.

This can be an informal name, not necessarily a name used to identify the host to the network.

3Select the operating system of your host in the Select host type box and then click Next.

44

About Your Host

Image 44
Contents Dell PowerVault Modular Disk Storage Manager User’s Guide W . d e l l . c o m s u p p o r t . d e l l . c o mFebruary Contents Connecting the Serial Cable System Setup for Password Reset Viewing iSCSI Statistics and Setting Baseline Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Troubleshooting Problems 101 Contents About This Guide User InterfaceModify Tab Configure TabSummary Tab Support Tab Tools TabISCSI Tab Other Information You May Need View online help View the event logAccess Virtual Disk About Your Storage ArrayOut-of-Band and In-Band Management Manual Addition of a Storage Array Adding Storage ArraysAutomatic Discovery of Storage Arrays Naming Storage Arrays Removing Storage ArraysSetting Up Your Storage Array Initial setup tasks includeStorage Array Storage Array Support Data Setting a PasswordTo set, change, or remove a password for a storage array Resetting a Password Password GuidelinesConnecting the Serial Cable Consider these guidelines when you create a passwordSystem Setup for Password Reset Microsoft Windows Operating SystemsReset Password Changing Expansion Enclosure ID Numbers Configuring Alert NotificationsConfiguring E-mail Alerts Storage Array Configuring Snmp Alerts Starting or Restarting the Host-Agent Software in Windows Starting or Restarting the Host-Agent Software in LinuxStorage Array Storage Array Using iSCSI Using the iSCSI TabCreating Chap Secrets Changing the iSCSI Target AuthenticationEntering Mutual Authentication Permissions Valid Ascii Characters for Chap Secrets Space Using iSCSI Type the alias in the iSCSI target alias field and click OK Changing the iSCSI Target IdentificationChanging the iSCSI Target Discovery Configuring the MD3000i iSCSI Host Ports Advanced iSCSI Host Ports SettingsLowest priority default Viewing or Ending an iSCSI SessionViewing iSCSI Statistics and Setting Baseline Statistics Edit, Remove, or Rename Host Topology Host Topology Actions Desired Action Using iSCSI Enabling the Event Monitor Service Status area, click Start Linux Event Monitor Disabling the Event Monitor Configuring Host Access About Your HostAutomatic Configuration Manual Configuration using SAS HBAManual Configuration using iSCSI Click NextRemoving Host Access Adding a Host to a Host Group Host GroupsCreating a Host Group Removing a Host From a Host Group Moving a Host to a Different Host GroupHost Topology Removing a Host GroupHost Context Agent Failover with Red Hat Enterprise Linux Create a virtual disk and map it to LUN Reboot the hostData Path Protection About Your Host Disk Groups and Virtual Disks Creating Disk Groups and Virtual Disks Manual Configuration Disk Groups and Virtual Disks Disk Groups and Virtual Disks Automatically Configuring Hot Spares Hot Spare Drive ProtectionManually Configuring Hot Spares Click OK in the dialog boxModifying and Removing Host-to-Virtual Disk Mapping Host-to-Virtual Disk MappingCreating Host-to-Virtual Disk Mappings Storage Partitioning Changing Controller Ownership of the Virtual DiskVirtual Disk Expansion Disk Group and Virtual Disk ExpansionDisk Group Expansion Storage Array Media Scan Changing Media Scan SettingsErrors discovered by the media scan include Suspending the Media Scan Microsoft ServicesVirtual Disk Service Volume Shadow-Copy Service Disk Groups and Virtual Disks Premium Feature-Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Simple Path About the Simple PathHost-to-Virtual Disk Mapping The default setting is Map now SMrepassist -ffilename-identifier Creating the Snapshot Using the Simple Path Snapshot Virtual Disks Creating a Snapshot Virtual Disk Using the Advanced Path About the Advanced PathSnapshot Virtual Disks SMrepassist -ffilename-identifier Creating the Snapshot Using the Advanced Path Snapshot Virtual Disks Specifying Snapshot Virtual Disk Names Source-virtual disk-name-sequence-numberSnapshot Repository Capacity Re-creating Snapshot Virtual Disks Disabling a Snapshot Virtual DiskTo disable a snapshot virtual disk Preparing Host Servers to Re-create a Snapshot Virtual DiskRe-creating a Snapshot Virtual Disk Premium Feature-Virtual Disk Copy Creating a Virtual Disk Copy for an Mscs Shared Disk Reasons to use virtual disk copy include the followingIf you are using the target virtual disk for backup purposes Virtual Disk Read/Write PermissionsVirtual Disk Copy Restrictions Creating a Virtual Disk Copy Preparing Host Servers to Create a Virtual Disk CopyClick Next at the bottom Copying the Virtual DiskChoose the target virtual disk Setting Copy Priority Storage Array Performance During Virtual Disk CopyStopping a Virtual Disk Copy Recopying a Virtual DiskTo stop a virtual disk copy, complete the following steps Click Yes to stop the virtual disk copyPreparing Host Servers to Recopy a Virtual Disk Recopying the Virtual Disk Removing Copy Pairs Virtual Disk Copy Firmware Downloads Downloading RAID Controller and Nvsram PackagesDownloading Both RAID Controller and Nvsram Firmware Downloading Only Nvsram Firmware Downloading Non-redundant Mscs Nvsram FirmwareDownloading Physical Disk Firmware Downloading EMM Firmware 100 Troubleshooting Problems Recovery GuruStorage Array Profile Device Health ConditionsSMrepassist Utility 102103 Support Information PackageClick Browse Recovering from an Unidentified Storage Array Unidentified DevicesPing host-name-or-IP-address-of-the-host 105Troubleshooting 107 Removing an EMM from the Expansion EnclosureInserting an EMM into an Expansion Enclosure 108 MD3000 Maintenance ConsiderationsRemoving and Inserting Physical Disks 109 110 Index 111Index 113 114