User manual

Table of Contents 9
Working with SCSI Storage Devices 78
Maintaining Cluster Communications 78
Enabling and Disabling Failover 79
Further V-Switch Cluster Configurations 79
Viewing V-Switch Neighbor Details 80
MANAGING A CLUSTER ................................................................................................... 81
CHAPTER 6: VOLUME CONFIGURATION .............................................. 83
INTRODUCTION TO VOLUME CONFIGURATION ................................................................... 84
IDENTIFYING AVAILABLE STORAGE DEVICES....................................................................85
CREATING A TRANSPARENT VOLUME ..............................................................................88
CREATING A SUBDISK (LUN CARVING) ........................................................................... 90
CREATING A SIMPLE VOLUME .........................................................................................93
CREATING A CONCATENATED VOLUME............................................................................95
CREATING A STRIPED VOLUME .......................................................................................97
CREATING A MIRRORED VOLUME ..................................................................................100
Replicating Data in a Mirrored Volume 101
CREATING A RAID 10 AND RAID 0+1........................................................................... 103
CHAPTER 7: VOLUME EXPOSURE & SECURITY .................................. 107
INTRODUCTION TO VOLUME EXPOSURE & SECURITY ...................................................... 108
iSCSI Targets 108
Identities 109
Access Rights 111
Authentication 113
Default Identity 113
CREATING AN ISCSI TARGET........................................................................................ 115
Viewing iSCSI Targets 116
Viewing iSCSI Target Details 117
Viewing Access Rights 117
CHANGING THE DEFAULT IDENTITY................................................................................ 119
CREATING AN IDENTITY................................................................................................. 120
ADDING INITIATORS TO AN IDENTITY .............................................................................. 122
ASSIGNING IDENTITY CREDENTIALS............................................................................... 125
Using a RADIUS Server 128
Viewing Configured RADIUS Servers 131
CONNECTING AN IDENTITY AND TARGET ........................................................................ 132
EXPOSING AN ISCSI TARGET AND LUN......................................................................... 134
Viewing LUNs 136
CHAPTER 8: ADVANCED VOLUME OPERATIONS................................ 137
INTRODUCTION TO ADVANCED VOLUME CONFIGURATIONS ............................................. 138
Data Replication: Off-line versus On-line 138
Mirror versus Snapshot 138
Actual Capacity versus Potential Capacity 138
Resizing versus Expanding 138