HP StorageWorks MSA1510i HP StorageWorks 1510i Modular Smart Array installatio - Page 17

iSCSI overview, Targets, Initiators, Switches, Key iSCSI best practices

Page 17 highlights

iSCSI overview • Targets • Initiators • Switches • Key iSCSI best practices IMPORTANT: The following overview is very brief. For additional detail, see the MSA1510i iSCSI concepts and deployment guide, provided on the MSA1510i Support CD v2.0 and MSA1510i support page: http://www.hp.com/support. Targets A target is a grouping of one or more MSA Logical Units (LUNs). The target is the unit presented to the network, with the initiator granted access to the target (and its assigned LUNs.) Consider the following: • Basic configurations with only one initiator accessing the storage might create a few large logical drives mapped to one target. An initiator granted access to that target has access to all of the storage. • More complex configurations with multiple initiators need to control access to the storage and create multiple storage units and multiple targets. Each initiator is then granted access to one or more specific targets. Targets may be shared among groups of initiators. Initiators In iSCSI networking, each server is called an initiator. Depending on the host operating system, iSCSI initiator software and other components, such as operating system patches or iSCSI Device Specific Modules (DSMs) are installed on the server to manage the connections to the IP network. In multipath configurations, iSCSI initiator software, combined with multipathing software or operating system patches, is used to establish the multiple paths to the storage. Multipathing is enabled in the iSCSI initiator software by performing multiple logins for each target via defined IP portals on the MSA1510i. A logon for each path/target combination must be established to enable redundancy. Switches The switch provides a physical path between the initiator and the MSA array, routing requests and data through the switch ports. The MSA1510i connects to its network switches from its Ethernet iSCSI module. The MSA1510i works with any Gigabit Ethernet switch. A switch is needed if multiple hosts are being used to connect to the MSA1510i. Key iSCSI best practices • Provide a dedicated iSCSI LAN to isolate the iSCSI network from corporate and external networks. • Isolate management traffic and storage traffic on separate LAN segments. • Use VLANs to control access to the storage targets. • Enter Access Control List (ACL) settings, to control access at the LUN level. • Enable mutual iSCSI CHAP authentication between initiators and targets. (Not supported for all operating systems.) 1510i Modular Smart Array installation and user guide 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160

iSCSI overview
Targets
Initiators
Switches
Key iSCSI best practices
IMPORTANT:
The following overview is very brief. For additional detail, see the
MSA1510i iSCSI concepts and
deployment guide
, provided on the MSA1510iSupport CD v2.0 and MSA1510isupport page:
h
t
t
p
:
/
/
w
w
w
.
h
p
.
c
o
m
/
s
u
p
p
o
r
t
.
Targets
A target is a grouping of one or more MSA Logical Units (LUNs). The target is the unit presented to the
network, with the initiator granted access to the target (and its assigned LUNs.)
Consider the following:
Basic con
gurations with only one initiator accessing the storage might create a few large
logical drives mapped to one target. An initiator granted access to that target has access to all
of the storage.
More complex con
gurations with multiple initiators need to control access to the storage and
create multiple storage units and multiple targets. Each initiator is then granted access to one or
more speci
c targets. Targets may be shared among groups of initiators.
Initiators
In iSCSI networking, each server is called an initiator.
Depending on the host operating system, iSCSI initiator software and other components, such as
operating system patches or iSCSI Device Speci
c Modules (DSMs) are installed on the server to manage
the connections to the IP network.
In multipath con
gurations, iSCSI initiator software, combined with multipathing software or operating
system patches, is used to establish the multiple paths to the storage. Multipathing is enabled in the iSCSI
initiator software by performing multiple logins for each target via de
ned IP portals on the MSA1510i. A
logon for each path/target combination must be established to enable redundancy.
Switches
The switch provides a physical path between the initiator and the MSA array, routing requests and data
through the switch ports. The MSA1510i connects to its network switches from its Ethernet iSCSI module.
The MSA1510i works with any Gigabit Ethernet switch. A switch is needed if multiple hosts are being
used to connect to the MSA1510i.
Key iSCSI best practices
Provide a dedicated iSCSI LAN to isolate the iSCSI network from corporate and external networks.
Isolate management traf
c and storage traf
c on separate LAN segments.
Use VLANs to control access to the storage targets.
Enter Access Control List (ACL) settings, to control access at the LUN level.
Enable mutual iSCSI CHAP authentication between initiators and targets. (Not supported for
all operating systems.)
1510i Modular Smart Array installation and user guide
17