Dell TL2000 Product Guide - Page 2

Connect to the TL2000/TL4000 from the Host Server - iscsi

Page 2 highlights

Connect to the TL2000/TL4000 from the Host Server 9 If you are using Windows Server 2008 Core Version 9 If you are using a Linux Server 10 Guidelines for Configuring Your Network for iSCSI 11 Linux Host Setup ...12 Avoiding duplicate iSCSI devices discovered by RH5 12 Avoiding duplicate iSCSI devices discovered by RH4 13 Viewing the status of your iSCSI connections 13 Performing Hardware Maintenance with your iSCSI solution 14 Reference information...15 Terminology...15 Understanding CHAP Authentication 15 Using iSNS ...15 Page 2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16

Page 2
Connect to the TL2000/TL4000 from the Host Server
..................................................................
9
If you are using Windows Server 2008 Core Version
................................................................
9
If you are using a Linux Server
................................................................................................
10
Guidelines for Configuring Your Network for iSCSI
....................................................................
11
Linux Host Setup
.....................................................................................................................
12
Avoiding duplicate iSCSI devices discovered by RH5
.........................................................
12
Avoiding duplicate iSCSI
devices discovered by RH4
........................................................
13
Viewing the status of your iSCSI connections
.........................................................................
13
Performing Hardware Maintenance with your iSCSI solution
..................................................
14
Reference information
.................................................................................................................
15
Terminology
.............................................................................................................................
15
Understanding CHAP Authentication
......................................................................................
15
Using iSNS
..............................................................................................................................
15