Dell EqualLogic PS6210X EqualLogic Host Integration Tools for Linux Version 1. - Page 7
B Enabling iSCSI Offload on HIT/Linux, C Bash Command Completion
View all Dell EqualLogic PS6210X manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 7 highlights
Step 4: Complete the Installation...116 Disabling Active Management...117 Enabling Storage Cluster Support ...117 B Enabling iSCSI Offload on HIT/Linux 118 Step 1: Set Up and Verify Your Configuration...118 Step 2: Configure the Network Interfaces...118 Step 3: Configure ehcmd to Use the Offload iSCSI Initiator 119 Step 4: Discover iSCSI Targets...119 Step 5: Logging In to Additional Targets...120 C Bash Command Completion...121 D DKMS Considerations for Red Hat Linux 123 Index...124 Contents 7
Step 4: Complete the Installation
.....................................................................................................................................
116
Disabling Active Management
.....................................................................................................................................
117
Enabling Storage Cluster Support
.............................................................................................................................
117
B Enabling iSCSI Offload on HIT/Linux
...........................................................................................
118
Step 1: Set Up and Verify Your Configuration
.................................................................................................................
118
Step 2: Configure the Network Interfaces
......................................................................................................................
118
Step 3: Configure ehcmd to Use the Offload iSCSI Initiator
........................................................................................
119
Step 4: Discover iSCSI Targets
.........................................................................................................................................
119
Step 5: Logging In to Additional Targets
........................................................................................................................
120
C Bash Command Completion
.......................................................................................................
121
D DKMS Considerations for Red Hat Linux
.....................................................................................
123
Index
.....................................................................................................................................................................
124
Contents
7