B
Appendix—Manual Configuration of iSCSI
The following sections contain
Table
Table B-1. Host Server Vs. Storage Array
This Step is Performed on the Host Server | This Step is Performed on the Storage |
Using the Microsoft or Linux iSCSI Initiator | Array Using MD Storage Manager |
3 Perform target discovery from the iSCSI initiator.
6 (Optional) Configure CHAP authentication on the host server.
7 Connect to the storage array from the host server.
1 Discover the storage array.
2 Configure the iSCSI ports on the storage array.
4 Configure host access.
5 (Optional) Configure Challenge Handshake Authentication Protocol (CHAP) authentication on the storage array.
8 (Optional) Set up
53