Introduction
You must identify the network settings for each iSCSI I/O port in a storage system, including the IP address, subnet mask, and gateway address. These settings define the targets of input from the servers in your environment. You must also identify network settings for the iSCSI I/O ports in servers that connect to the storage system; these settings define the initiators of I/O between servers and the SSR212PP2i and SSR212PPi storage systems.
In some contexts, iSCSI documentation refers to the servers and storage systems themselves as initiators and targets, respectively.
Terminology
In this document, we use the terms initiator, target, server, and storage system as follows:
Initiator | A port on a NIC or iSCSI HBA that issues I/O requests to a target in the |
| storage system. NICs and HBAs are installed on the environment s |
| servers. |
Target | A storage system port (target portal) that accepts and responds to requests |
| from an initiator. In iSCSI systems the targets, called |
| ports, are on storage processors. |
Server | A host connected (directly or through a network router or switch) to the |
| |
| also be a management station. |
Storage system Your SSR212PP2i and SSR212PPi storage system.
iSNS
You can use the Internet Storage Naming Service (iSNS) on Windows platforms that are part of an iSCSI configuration. iSNS requires an iSNS server on the storage network and a client storage system; other hosts connected to the storage system are also iSNS clients.
The iSNS server acts as the repository where hosts and storage devices register their lists of initiators and targets. Each individual initiator or target registers its components with the iSNS server; the server then answers the initiator s queries for devices with the list of registered targets. Discovery domains implemented on the server restrict what targets an initiator sees.
CHAP
To prevent unauthorized access to the storage system, you can set up CHAP (Challenge Handshake Authentication Protocol) authentication for both the initiator and the target. For CHAP authentication, you specify a username and password (called a secret) that any initiator must use to connect to the target through the iSCSI ports; the target authenticates
16 | Intel Storage System SSR212PP User Guide |
| Revision 1.0 |