Appendix—Manual Configuration of iSCSI 53
B

Appendix—Manual Configuration

of iSCSI

The following sections contain step-by-step instructions for configuring
iSCSI on your storage array. However, before beginning, it is important to
understand where each of these steps occur in relation to your host server or
the storage array environment.
TableB-1 shows each iSCSI configuration step and where it occurs.
Table B-1. Host Server Vs. Storage Array
This Step is Performed on the Host Server
Using the Microsoft or Linux iSCSI Initiator
This Step is Performed on the Storage
Array Using MD Storage Manager
1
Discover the storage array.
2
Configure the iSCSI ports on the
storage array.
3
Perform target discovery from the iSCSI
initiator.
4
Configure host access.
5
(Optional) Configure
Challenge
Handshake Authentication
Protocol (
CHAP) authentication on
the storage array.
6
(Optional) Configure CHAP
authentication on the host server.
7
Connect to the storage array from the
host server.
8
(Optional) Set up in-band
management.
book.book Page 53 Thursday, July 18, 2013 5:56 PM