SANRAD V-Switch manual Volume Exposure & Security

Models: V-Switch

1 300
Download 300 pages 15.92 Kb
Page 15
Image 15

Working with SCSI Storage Devices

78

Maintaining Cluster Communications

78

Enabling and Disabling Failover

79

Further V-Switch Cluster Configurations

79

Viewing V-Switch Neighbor Details

80

MANAGING A CLUSTER

81

CHAPTER 6: VOLUME CONFIGURATION

83

INTRODUCTION TO VOLUME CONFIGURATION

84

IDENTIFYING AVAILABLE STORAGE DEVICES

85

CREATING A TRANSPARENT VOLUME

88

CREATING A SUBDISK (LUN CARVING)

90

CREATING A SIMPLE VOLUME

93

CREATING A CONCATENATED VOLUME

95

CREATING A STRIPED VOLUME

97

CREATING A MIRRORED VOLUME

100

Replicating Data in a Mirrored Volume

101

CREATING A RAID 10 AND RAID 0+1

103

CHAPTER 7: VOLUME EXPOSURE & SECURITY

107

INTRODUCTION TO VOLUME EXPOSURE & SECURITY

108

iSCSI Targets

108

Identities

109

Access Rights

111

Authentication

113

Default Identity

113

CREATING AN ISCSI TARGET

115

Viewing iSCSI Targets

116

Viewing iSCSI Target Details

117

Viewing Access Rights

117

CHANGING THE DEFAULT IDENTITY

119

CREATING AN IDENTITY

120

ADDING INITIATORS TO AN IDENTITY

122

ASSIGNING IDENTITY CREDENTIALS

125

Using a RADIUS Server

128

Viewing Configured RADIUS Servers

131

CONNECTING AN IDENTITY AND TARGET

132

EXPOSING AN ISCSI TARGET AND LUN

134

Viewing LUNs

136

CHAPTER 8: ADVANCED VOLUME OPERATIONS

137

INTRODUCTION TO ADVANCED VOLUME CONFIGURATIONS

138

Data Replication: Off-line versus On-line

138

Mirror versus Snapshot

138

Actual Capacity versus Potential Capacity

138

Resizing versus Expanding

138

Table of Contents

9

Page 15
Image 15
SANRAD V-Switch manual Volume Exposure & Security