Dell PowerVault TL4000 Setting Up Your iSCSI Bridge - Page 2

Connect to the TL2000/TL4000 from the Host Server, If you are using Windows Server 2008 Core Version

Page 2 highlights

Connect to the TL2000/TL4000 from the Host Server 9 If you are using Windows Server 2008 Core Version 9 If you are using a Linux Server 10 Guidelines for Configuring Your Network for iSCSI 10 Linux Host Setup ...12 Avoiding duplicate iSCSI devices discovered by RH5 12 Avoiding duplicate iSCSI devices discovered by RH4 13 Viewing the status of your iSCSI connections 13 Performing Hardware Maintenance with your iSCSI solution 13 Reference information...15 Terminology...15 Understanding CHAP Authentication 15 Using iSNS ...15 Page 2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16

Page 2
Connect to the TL2000/TL4000 from the Host Server
................................................................
9
If you are using Windows Server 2008 Core Version
..............................................................
9
If you are using a Linux Server
..............................................................................................
10
Guidelines for Configuring Your Network for iSCSI
...................................................................
10
Linux Host Setup
...................................................................................................................
12
Avoiding duplicate iSCSI devices discovered by RH5
........................................................
12
Avoiding duplicate iSCSI
devices discovered by RH4
.......................................................
13
Viewing the status of your iSCSI connections
........................................................................
13
Performing Hardware Maintenance with your iSCSI solution
.................................................
13
Reference information
...............................................................................................................
15
Terminology
...........................................................................................................................
15
Understanding CHAP Authentication
.....................................................................................
15
Using iSNS
............................................................................................................................
15