Contents 7
Setting the Storage Array RAID
Controller Module Clocks. . . . . . . . . . . . . . 79
7 Configuration: Using iSCSI . . . . . . . . . . . 81
Changing the iSCSI Target Authentication . . . . . . . 81
Entering Mutual Authentication Permissions. . . . . . 82
Creating CHAP Secrets . . . . . . . . . . . . . . . . . 82
Initiator CHAP Secret. . . . . . . . . . . . . . . . 83
Target CHAP Secret . . . . . . . . . . . . . . . . 83
Valid Characters for CHAP Secrets . . . . . . . . 83
Changing the iSCSI Target Identification . . . . . . . . 84
Changing the iSCSI Target Discovery Settings . . . . . 84
Configuring the iSCSI Host Ports . . . . . . . . . . . . 85
Advanced iSCSI Host Ports Settings . . . . . . . . . . 87
Viewing or Ending an iSCSI Session . . . . . . . . . . 88
Viewing iSCSI Statistics and
Setting Baseline Statistics . . . . . . . . . . . . . . . 89
Edit, Remove, or Rename Host Topology . . . . . . . . 90
8 Configuration: Event Monitor . . . . . . . . . 91
Enabling or Disabling the Event Monitor . . . . . . . . 91
Windows . . . . . . . . . . . . . . . . . . . . . . 92
Linux . . . . . . . . . . . . . . . . . . . . . . . . 92
book.book Page 7 Wednesday, May 26, 2010 2:14 PM