Administrator Guide
Table Of Contents
- Dell EMC PowerVault ME4 Series Storage System Administrator’s Guide
- Contents
- Getting started
- New user setup
- Configure and provision a new storage system
- Using the PowerVault Manager interface
- System concepts
- About virtual and linear storage
- About disk groups
- About RAID levels
- About ADAPT
- About SSDs
- About SSD read cache
- About spares
- About pools
- About volumes and volume groups
- About volume cache options
- About thin provisioning
- About automated tiered storage
- About initiators, hosts, and host groups
- About volume mapping
- About operating with a single controller
- About snapshots
- About copying volumes
- About reconstruction
- About quick rebuild
- About performance statistics
- About firmware updates
- About managed logs
- About SupportAssist
- About CloudIQ
- About configuring DNS settings
- About replicating virtual volumes
- About the Full Disk Encryption feature
- About data protection with a single controller
- Working in the Home topic
- Guided setup
- Provisioning disk groups and pools
- Attaching hosts and volumes in the Host Setup wizard
- Overall system status
- Configuring system settings
- Managing scheduled tasks
- Working in the System topic
- Viewing system components
- Systems Settings panel
- Resetting host ports
- Rescanning disk channels
- Clearing disk metadata
- Updating firmware
- Changing FDE settings
- Configuring advanced settings
- Changing disk settings
- Changing system cache settings
- Configuring partner firmware update
- Configuring system utilities
- Using maintenance mode
- Restarting or shutting down controllers
- Working in the Hosts topic
- Working in the Pools topic
- Working in the Volumes topic
- Viewing volumes
- Creating a virtual volume
- Creating a linear volume
- Modifying a volume
- Copying a volume or snapshot
- Abort a volume copy
- Adding volumes to a volume group
- Removing volumes from a volume group
- Renaming a volume group
- Remove volume groups
- Rolling back a virtual volume
- Deleting volumes and snapshots
- Creating snapshots
- Resetting a snapshot
- Creating a replication set from the Volumes topic
- Initiating or scheduling a replication from the Volumes topic
- Manage replication schedules from the Volumes topic
- Working in the Mappings topic
- Working in the Replications topic
- About replicating virtual volumes in the Replications topic
- Replication prerequisites
- Replication process
- Creating a virtual pool for replication
- Setting up snapshot space management in the context of replication
- Replication and empty allocated pages
- Disaster recovery
- Accessing the data while keeping the replication set intact
- Accessing the data from the backup system as if it were the primary system
- Disaster recovery procedures
- Viewing replications
- Querying a peer connection
- Creating a peer connection
- Modifying a peer connection
- Deleting a peer connection
- Creating a replication set from the Replications topic
- Modifying a replication set
- Deleting a replication set
- Initiating or scheduling a replication from the Replications topic
- Stopping a replication
- Suspending a replication
- Resuming a replication
- Manage replication schedules from the Replications topic
- About replicating virtual volumes in the Replications topic
- Working in the Performance topic
- Working in the banner and footer
- Banner and footer overview
- Viewing system information
- Viewing certificate information
- Viewing connection information
- Viewing system date and time information
- Viewing user information
- Viewing health information
- Viewing event information
- Viewing capacity information
- Viewing host information
- Viewing tier information
- Viewing recent system activity
- Other management interfaces
- SNMP reference
- Using FTP and SFTP
- Using SMI-S
- Using SLP
- Administering a log-collection system
- Best practices
- System configuration limits
- Glossary of terms
3. Enter the destination port address for the remote system.
4. Enter the name and password of a user with the manage role on the remote system.
5. Click OK.
6. If the task succeeds, click OK in the confirmation dialog. The peer connection is created and the Peer Connections table is
updated.
If the task does not succeed, the Create Peer Connection panel appears with errors in red text. Correct the errors, then click
OK.
CHAP and replication
If you want to use Challenge Handshake Authentication Protocol (CHAP) for the iSCSI connection between peer systems,
see the procedure below to set up CHAP. Make sure that you configure both systems in this way. In a peer connection,
both systems will alternately act as an originator (initiator) and recipient (target) of a login request. Peer connections support
one-way CHAP only.
If only one system has CHAP enabled and the two systems do not have CHAP records for each other, or the CHAP records
have different secrets, the system with CHAP enabled will be able to modify the peer connection. However, it will be unable
to perform any other replication operations, such as creating replication sets, initiating replications, or suspending replication
operations. The system that does not have CHAP enabled will be unable to perform any replication operations, including
modifying and deleting the peer connection. For full replication functionality for both systems, set up CHAP for a peer
connection (see the following procedure).
If the two systems have CHAP records for each other with the same secret, they can perform all replication operations whether
or not CHAP is enabled on either system. In other words, even if CHAP is enabled on neither system, only one system, or both
systems, either system can work with peer connections, replication sets, and replications.
If you want to use Challenge Handshake Authentication Protocol (CHAP) for the iSCSI connection between peer systems, see
the following procedure to set up CHAP. In a peer connection, both systems will alternately act as an initiator and target of a
login request. Peer connections support one-way CHAP only.
Set up CHAP for a peer connection using the CLI
1. If you have not already configured CHAP, run query peer-connection from either the local system or the remote
system to ensure that they have connectivity.
2. If you have an existing peer connection, stop I/O to it.
3. On the local system, use the create chap-record command to create a CHAP record for one-way CHAP to allow
access by the remote system.
4. On the remote system, use the create chap-record command to create a CHAP record for one-way CHAP to the local
system. Note that the same CHAP record used from the local system may also be used here but the configuration is still
one-way CHAP.
5. On each system, enable CHAP by running: set iscsi-parameters chap on
CAUTION:
Enabling or disabling CHAP will cause all iSCSI host ports in the system to be reset and restarted.
This may prevent iSCSI hosts from being able to reconnect if their CHAP settings are incorrect.
6. Wait one minute for the commands to complete before attempting to use the peer connection.
7. Run query peer-connection from the local system and then from the remote system to ensure communication can be
initiated from either system.
● If both succeed, you can create, set, or perform replication on that peer connection.
● If either fails, it is likely that you must fix a CHAP configuration issue and then repeat these steps as appropriate. If you
need to modify a CHAP record, use the set chap-record command.
Modifying a peer connection
You can change the name of a current peer connection or the port address of the remote system from either the local system
or the remote system without changing the peer connection configurations. For example, you could configure a peer connection
and then move one of the peers to a different network.
126
Working in the Replications topic