Hardware manual
Group Administration Table of Contents
vi
Displaying storage pool details ............................................................................................................................... 7-3
Storage pool status tab...................................................................................................................................... 7-3
Storage pool volumes tab ................................................................................................................................. 7-4
Moving a member to a pool .................................................................................................................................... 7-4
Moving a volume to a pool ..................................................................................................................................... 7-5
Merging storage pools............................................................................................................................................. 7-5
Modifying a storage pool name or description........................................................................................................ 7-5
Deleting a storage pool............................................................................................................................................ 7-6
8 iSCSI target security........................................................................................................................... 8-1
About iSCSI access requirements ........................................................................................................................... 8-1
About iSCSI target access controls ......................................................................................................................... 8-1
Authenticating initiators through CHAP................................................................................................................. 8-2
Displaying local CHAP accounts ..................................................................................................................... 8-2
Creating a local CHAP account........................................................................................................................ 8-2
Modifying a local CHAP account .................................................................................................................... 8-3
Deleting a local CHAP account........................................................................................................................ 8-3
Using CHAP accounts on a RADIUS authentication server............................................................................ 8-3
Configuring target authentication..................................................................................................................... 8-4
About iSNS servers ................................................................................................................................................. 8-4
Configuring the group to use an iSNS server................................................................................................... 8-5
Modifying an iSNS server.......................................................................................................................... 8-5
Deleting an iSNS server ............................................................................................................................. 8-6
Preventing the discovery of unauthorized targets ................................................................................................... 8-6
Enable the iSCSI discovery filter ..................................................................................................................... 8-6
Disable the iSCSI discovery filter .................................................................................................................... 8-6
Multi-host access to targets..................................................................................................................................... 8-6
Connecting initiators to iSCSI targets..................................................................................................................... 8-7
9 Basic volume operations.................................................................................................................... 9-1
About volumes ........................................................................................................................................................ 9-1
About volume types ................................................................................................................................................ 9-1
Displaying the iSCSI target name and alias............................................................................................................ 9-2
About volume space allocation ............................................................................................................................... 9-2
About volume security and access controls ............................................................................................................ 9-2
About volume data protection ................................................................................................................................. 9-3
Volume attributes .................................................................................................................................................... 9-3
Displaying group-wide default volume settings...................................................................................................... 9-5
Modifying group-wide volume settings ........................................................................................................... 9-5
Creating standard volumes...................................................................................................................................... 9-5
Displaying volumes................................................................................................................................................. 9-6
Displaying volume details....................................................................................................................................... 9-7
Displaying volume status.................................................................................................................................. 9-7
Displaying access control records .................................................................................................................... 9-8
Displaying volume snapshots ........................................................................................................................... 9-8
Displaying volume replication.......................................................................................................................... 9-9
Displaying volume collections ......................................................................................................................... 9-9
Displaying volume schedules ........................................................................................................................... 9-9
Displaying volume connections...................................................................................................................... 9-10
Displaying thin clones attached to a volume.................................................................................................. 9-10