Dell PowerVault TL4000 Dell Model TL24iSCSIxSAS 1Gb iSCSI to SAS - User's G - Page 51

Adding an iSCSI Target

Page 51 highlights

Appendix C CRC/Checksum settings allow the user to specify whether the discovery is done using Data and/or Header Digests. Unless the iSCSI device is on a poor quality network where data corruption is likely, it is recommended then Header and Data Digests are left disabled, as performance will be affected. If the iSCSI bridge has had CHAP enabled, or the user wishes to authenticate the iSCSI bridge, click on the checkbox 'CHAP login information' to enable CHAP. Now enter the username and target secret that was configured on the iSCSI bridge. If the user wishes to authenticate the iSCSI bridge, select 'Perform mutual authentication'. Note: For mutual CHAP to be performed, the Initiator Secret must be set on the general tab, and be the same as the one configured on the iSCSI bridge. The use of RADUS is beyond the scope of this guide. Once the user is satisfied that all advanced options are correct click OK. The user should now see a window as in Figure 35. Figure 35 Adding an iSCSI Target Dell Model TL24iSCSIxSAS 1Gb iSCSI to SAS User's Guide Rev.C Page 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66

Appendix C
Dell Model TL24iSCSIxSAS 1Gb iSCSI to SAS User’s Guide
Rev.C
Page 49
CRC/Checksum settings allow the user to specify whether the discovery is done using Data and/or Header
Digests.
Unless the iSCSI device is on a poor quality network where data corruption is likely, it is
recommended then Header and Data Digests are left disabled, as performance will be affected.
If the iSCSI bridge has had CHAP enabled, or the user wishes to authenticate the iSCSI bridge, click on the
checkbox ‘CHAP login information’ to enable CHAP.
Now enter the username and target secret that was
configured on the iSCSI bridge.
If the user wishes to authenticate the iSCSI bridge, select ‘Perform mutual
authentication’.
Note:
For mutual CHAP to be performed, the Initiator Secret must be set on
the general tab, and be the same as the one configured on the iSCSI
bridge.
The use of RADUS is beyond the scope of this guide.
Once the user is satisfied that all advanced options are correct click OK.
The user should now see a window as in Figure 35.
Figure 35 Adding an iSCSI Target