Working with SCSI Storage Devices | 78 |
Maintaining Cluster Communications | 78 |
Enabling and Disabling Failover | 79 |
Further | 79 |
Viewing | 80 |
MANAGING A CLUSTER | 81 |
CHAPTER 6: VOLUME CONFIGURATION | 83 |
INTRODUCTION TO VOLUME CONFIGURATION | 84 |
IDENTIFYING AVAILABLE STORAGE DEVICES | 85 |
CREATING A TRANSPARENT VOLUME | 88 |
CREATING A SUBDISK (LUN CARVING) | 90 |
CREATING A SIMPLE VOLUME | 93 |
CREATING A CONCATENATED VOLUME | 95 |
CREATING A STRIPED VOLUME | 97 |
CREATING A MIRRORED VOLUME | 100 |
Replicating Data in a Mirrored Volume | 101 |
CREATING A RAID 10 AND RAID 0+1 | 103 |
CHAPTER 7: VOLUME EXPOSURE & SECURITY | 107 |
INTRODUCTION TO VOLUME EXPOSURE & SECURITY | 108 |
iSCSI Targets | 108 |
Identities | 109 |
Access Rights | 111 |
Authentication | 113 |
Default Identity | 113 |
CREATING AN ISCSI TARGET | 115 |
Viewing iSCSI Targets | 116 |
Viewing iSCSI Target Details | 117 |
Viewing Access Rights | 117 |
CHANGING THE DEFAULT IDENTITY | 119 |
CREATING AN IDENTITY | 120 |
ADDING INITIATORS TO AN IDENTITY | 122 |
ASSIGNING IDENTITY CREDENTIALS | 125 |
Using a RADIUS Server | 128 |
Viewing Configured RADIUS Servers | 131 |
CONNECTING AN IDENTITY AND TARGET | 132 |
EXPOSING AN ISCSI TARGET AND LUN | 134 |
Viewing LUNs | 136 |
CHAPTER 8: ADVANCED VOLUME OPERATIONS | 137 |
INTRODUCTION TO ADVANCED VOLUME CONFIGURATIONS | 138 |
Data Replication: | 138 |
Mirror versus Snapshot | 138 |
Actual Capacity versus Potential Capacity | 138 |
Resizing versus Expanding | 138 |
Table of Contents | 9 |