Dell PowerVault MD3260 Administrator's Guide - Page 5

Using iSCSI, Event Monitor, About Your Host, Moving A Host To A Different Host Group

Page 5 highlights

Configuring E-mail Alerts...40 Configuring SNMP Alerts...41 Battery Settings...42 Changing The Battery Settings...42 Setting The Storage Array RAID Controller Module Clocks 42 4 Using iSCSI...45 Changing The iSCSI Target Authentication...45 Entering Mutual Authentication Permissions...45 Creating CHAP Secrets...46 Initiator CHAP Secret...46 Target CHAP Secret...46 Valid Characters For CHAP Secrets...46 Changing The iSCSI Target Identification...47 Changing The iSCSI Target Discovery Settings...47 Configuring The iSCSI Host Ports...47 Advanced iSCSI Host Port Settings...48 Viewing Or Ending An iSCSI Session...49 Viewing iSCSI Statistics And Setting Baseline Statistics 49 Edit, Remove, Or Rename Host Topology...50 5 Event Monitor...51 Enabling Or Disabling The Event Monitor...51 Windows...51 Linux...51 6 About Your Host...53 Configuring Host Access...53 Using The Host Mappings Tab...53 Defining A Host...54 Removing Host Access...55 Managing Host Groups...55 Creating A Host Group...55 Adding A Host To A Host Group...56 Removing A Host From A Host Group...56 Moving A Host To A Different Host Group...56 Removing A Host Group...56 Host Topology...57 Starting Or Stopping The Host Context Agent 57 I/O Data Path Protection...57 Managing Host Port Identifiers...58

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Configuring E-mail Alerts
.................................................................................................................................
40
Configuring SNMP Alerts
.................................................................................................................................
41
Battery Settings
......................................................................................................................................................
42
Changing The Battery Settings
........................................................................................................................
42
Setting The Storage Array RAID Controller Module Clocks
...................................................................................
42
4 Using iSCSI
.................................................................................................................................
45
Changing The iSCSI Target Authentication
............................................................................................................
45
Entering Mutual Authentication Permissions
.........................................................................................................
45
Creating CHAP Secrets
...........................................................................................................................................
46
Initiator CHAP Secret
.......................................................................................................................................
46
Target CHAP Secret
.........................................................................................................................................
46
Valid Characters For CHAP Secrets
.................................................................................................................
46
Changing The iSCSI Target Identification
..............................................................................................................
47
Changing The iSCSI Target Discovery Settings
.....................................................................................................
47
Configuring The iSCSI Host Ports
...........................................................................................................................
47
Advanced iSCSI Host Port Settings
........................................................................................................................
48
Viewing Or Ending An iSCSI Session
......................................................................................................................
49
Viewing iSCSI Statistics And Setting Baseline Statistics
.......................................................................................
49
Edit, Remove, Or Rename Host Topology
...............................................................................................................
50
5 Event Monitor
.............................................................................................................................
51
Enabling Or Disabling The Event Monitor
...............................................................................................................
51
Windows
..........................................................................................................................................................
51
Linux
.................................................................................................................................................................
51
6 About Your Host
.........................................................................................................................
53
Configuring Host Access
........................................................................................................................................
53
Using The Host Mappings Tab
................................................................................................................................
53
Defining A Host
.................................................................................................................................................
54
Removing Host Access
...........................................................................................................................................
55
Managing Host Groups
...........................................................................................................................................
55
Creating A Host Group
............................................................................................................................................
55
Adding A Host To A Host Group
.......................................................................................................................
56
Removing A Host From A Host Group
...............................................................................................................
56
Moving A Host To A Different Host Group
.......................................................................................................
56
Removing A Host Group
...................................................................................................................................
56
Host Topology
...................................................................................................................................................
57
Starting Or Stopping The Host Context Agent
..................................................................................................
57
I/O Data Path Protection
.........................................................................................................................................
57
Managing Host Port Identifiers
..............................................................................................................................
58