B

Appendix—Manual Configuration of iSCSI

The following sections contain step-by-step instructions for configuring iSCSI on your storage array. However, before beginning, it is important to understand where each of these steps occur in relation to your host server or the storage array environment.

Table B-1 shows each iSCSI configuration step and where it occurs.

Table B-1. Host Server Vs. Storage Array

This Step is Performed on the Host Server

This Step is Performed on the Storage

Using the Microsoft or Linux iSCSI Initiator

Array Using MD Storage Manager

3 Perform target discovery from the iSCSI initiator.

6 (Optional) Configure CHAP authentication on the host server.

7 Connect to the storage array from the host server.

1 Discover the storage array.

2 Configure the iSCSI ports on the storage array.

4 Configure host access.

5 (Optional) Configure Challenge Handshake Authentication Protocol (CHAP) authentication on the storage array.

8 (Optional) Set up in-band management.

Appendix—Manual Configuration of iSCSI

53

Page 53
Image 53
Dell MD3220, MD3200 manual Appendix-Manual Configuration of iSCSI, Table B-1. Host Server Vs. Storage Array